close
This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

An Integrated Approach to Combat Cyber Threat

downloadDownload printPrint

Remember! This is just a sample.

You can get your custom paper by one of our expert writers.

Get custom essay

121 writers online

blank-ico
Download PDF

Michelle Alvarez had great advice about how to prevent a cyber-threat. But what happens if you don’t prevent the data breech? Companies can implement the best security policies and take every precaution, but no network or cyber data is 100% safe. It is not a matter of if a failure will happen, it’s a matter of when. Do you know what you should do when the inevitable strikes? We will touch all the bases after a breech. What do once a breech is discovered, who you should contact, how to repair your reputation, and a few tips.

The very first thing you should do is contain or stop the attack or loss of data. If the data is being stolen over the network, remove all your devices from the internet immediately. This will eliminate the data transfer over the internet until you can fix the leak. If the hack was malware, it can prevent further spread. If the leak was a UBS drive, you should still remove your devices from the internet until you can change passwords and credentials to your network. The drive could have contained credentials, if this happens, a password change will not be enough.

Additionally, there should be great efforts made to retrieve the device that leaked the data. This attempt should be left to law enforcement. Once the data loss is stopped, you should start making phone calls. You will want to get a data forensics team. They can help you find the total reach of the data leak. As they work, they will collect evidence as to who’s responsible. The forensics team can also give input on the changes you should make after a breech. The local governing body should also be informed. Whether its law enforcement or the State government, the loss should be reported. In states like California, it is the law that all data losses must be reported to the individual whose data was stolen and it must also be reported to the state. I highly recommend that you look at the rules and regulations for your state. You should also call a lawyer immediately. A legal team will help you navigate the laws and minimize your legal repercussions.

There are a few notes that should be mentioned. From this point on, I would only act under the direct order of my lawyer, law enforcement, or the government. Ask them to tell you when it is safe to resume operations. Do not interfere. Let them work, your cooperation looks good in the public’s eye! Also, do not destroy any evidence you found. Leave all evidence in tack. This seems obvious but, do not hide the attack. Uber was just fined $148 million for failing to report a hack that occurred in 2016. Hiding the problem will make it worse, for the business and your customers. The report should be filed fast. The more time that ticks by, the less chance you have of getting a handle on things. So, act quickly! After the data compromise is cleaned up, it’s time to rebuild your reputation.

Personally, I would recommend the company to make amends with clients. Offer to pay for credit monitoring for a few years. You should also note the security improvements you and your forensic team have created to increase security of data. Always follow through with the improvements! No one likes an empty promise. When a data compromise occurs, look at a few of these suggestions to guide you in the right direction. We are routinely taught to fortify and protect our network and data. The aftermath is not something we cover very often. So, just a recap, if you are ever victim to a data loss, you should stop the progression of the data loss.

Next, make the appropriate phone calls to a lawyer, a forensic data team, and the authorities. Let them do their job and work in cooperation with the authorities. Then, finally, clean up your reputation! Now you have a starting off point about what to do should there ever be a data compromise.

Remember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

experts 450+ experts on 30 subjects ready to help you just now

delivery Starting from 3 hours delivery

Find Free Essays

We provide you with original essay samples, perfect formatting and styling

Cite this Essay

To export a reference to this article please select a referencing style below:

An Integrated Approach to Combat Cyber Threat. (2020, March 16). GradesFixer. Retrieved August 15, 2022, from https://gradesfixer.com/free-essay-examples/an-integrated-approach-to-combat-cyber-threat/
“An Integrated Approach to Combat Cyber Threat.” GradesFixer, 16 Mar. 2020, gradesfixer.com/free-essay-examples/an-integrated-approach-to-combat-cyber-threat/
An Integrated Approach to Combat Cyber Threat. [online]. Available at: <https://gradesfixer.com/free-essay-examples/an-integrated-approach-to-combat-cyber-threat/> [Accessed 15 Aug. 2022].
An Integrated Approach to Combat Cyber Threat [Internet]. GradesFixer. 2020 Mar 16 [cited 2022 Aug 15]. Available from: https://gradesfixer.com/free-essay-examples/an-integrated-approach-to-combat-cyber-threat/
copy to clipboard
close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    boy

    Hi there!

    Are you interested in getting a customized paper?

    Check it out!
    Don't use plagiarized sources. Get your custom essay. Get custom paper
    exit-popup-close

    Haven't found the right essay?

    Get an expert to write you the one you need!

    exit-popup-print

    Professional writers and researchers

    exit-popup-quotes

    Sources and citation are provided

    exit-popup-clock

    3 hour delivery

    exit-popup-persone