{"id":44946,"date":"2020-10-05T18:46:33","date_gmt":"2020-10-05T14:46:33","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=44946"},"modified":"2025-11-21T13:13:00","modified_gmt":"2025-11-21T09:13:00","slug":"how-to-respond-to-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/how-to-respond-to-cyberattacks\/","title":{"rendered":"Best Ways to Respond to Cyberattacks on Your Business"},"content":{"rendered":"<p>If you run a small business (or even a large one), you probably spend a significant amount of time thinking about how to protect yourself from cyberattacks.<\/p>\n<p>This is, of course, time well spent. You definitely need to understand <a href=\"https:\/\/www.msp360.com\/resources\/blog\/ransomware-attack-scenarios-and-how-to-be-protected\/\">ransomware attack scenarios<\/a>, how <a href=\"https:\/\/www.msp360.com\/resources\/blog\/types-of-phishing\/\">phishing attacks work<\/a>, and <a href=\"https:\/\/www.msp360.com\/resources\/blog\/social-engineering-prevention\/\">how to prevent social engineering attacks<\/a>.<!--more--><\/p>\n<p>But let me share a secret with you: in many cases, how you respond to an attack after it has happened is just as important as \u2013 and perhaps more important than \u2013 the cyberdefenses you have in place. Even the most advanced cybersecurity systems do not offer 100% protection, and the fact is that you are going to get hacked at some point.<\/p>\n<p>In this article, we'll look at the key steps you need to take following a cyberattack.<\/p>\n<h2>Developing an IR Plan<\/h2>\n<p>The first point to make is this: that all of the steps below should already appear in your incident response (IR) plan. I understand, of course, that if you are reading this because you\u2019ve just been hacked and don\u2019t know what to do, pointing out that you should already have a plan will not be very useful.<\/p>\n<p>Nevertheless, it\u2019s crucial that all businesses develop a detailed IR plan for responding to cyberattacks, and there are plenty of resources out there that can help you do so. The NIST <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/specialpublications\/nist.sp.800-61r2.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Computer Security Incident Handling Guide<\/a> (SP 800-61), the gold standard for guidance in this regard, specifies four areas that should be addressed in this plan:<\/p>\n<ul>\n<li>Preparation \u2013 Planning in advance how to handle and prevent security incidents<\/li>\n<li>Detection and analysis \u2013 Encompasses everything from monitoring potential attack vectors to looking for signs of an incident, to prioritization<\/li>\n<li>Containment, eradication, and recovery \u2013 Developing a containment strategy, identifying the hosts and systems under attack, mitigating the effects, and having a plan for recovery<\/li>\n<li>Post-incident activity \u2013 Reviewing lessons learned and having a plan for evidence retention<\/li>\n<\/ul>\n<p>These principles can also be applied to the way in which you respond to a cyberattack.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/designing-a-ransomware-response-plan\/\">Designing a Ransomware Response Plan<\/a><\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\" style=\"width: 65%;\">\n<div class=\"call-to-action__title\">Responding to a Data Breach: Guide for MSPs<\/div>\n<div class=\"call-to-action__text\">Learn how to create a flexible and robust data breach response plan and prepare for the unexpected.<\/div>\n<\/div>\n<div class=\"call-to-action__right\" style=\"width: 35%;\">\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/05\/PDF.png\" alt=\"Whitepaper icon\" \/><\/p>\n<p style=\"text-align: center;\"><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-62d663a3-9fca-42d8-9dc3-fdc92166abc0\" data-portal=\"5442029\" data-id=\"62d663a3-9fca-42d8-9dc3-fdc92166abc0\"><span class=\"hs-cta-node hs-cta-62d663a3-9fca-42d8-9dc3-fdc92166abc0\" id=\"hs-cta-62d663a3-9fca-42d8-9dc3-fdc92166abc0\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/62d663a3-9fca-42d8-9dc3-fdc92166abc0\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-62d663a3-9fca-42d8-9dc3-fdc92166abc0\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/62d663a3-9fca-42d8-9dc3-fdc92166abc0.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<\/div>\n<\/div>\n<h2>How to Respond to a Cyberattack<\/h2>\n<p>Every cyberattack and every organization is different. However, it\u2019s possible to outline a fairly standard set of responses to cyber-incidents. Here they are.<\/p>\n<h3>1. Prevention<\/h3>\n<p>The first step in responding to a successful cyberattack is to iterate the lessons you\u2019ve learned from the recent attack back into your IR planning. Once you\u2019ve identified how you were hacked, you should take immediate steps to disseminate these lessons to all relevant staff groups. In particular, you should ensure that all staff know how to protect your business, and are aware of <a href=\"https:\/\/www.msp360.com\/resources\/blog\/password-management\/\">the importance of setting a strong password<\/a>.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/ransomware-protection\/\">Stay safe from ransomware<\/a> with MSP360<\/p>\n<h3>2. Communication and Delegation<\/h3>\n<p>Next, you should immediately inform every relevant staff member that an attack has occurred. This will certainly include technical teams, but it should also extend to your customer service teams, who may have to field some complicated requests and complaints over the coming few weeks.<\/p>\n<p>Secondly, assemble a team that is able to carry out the steps below. Appoint a team leader who will have overall responsibility for responding to the incident, and make sure that this team is protected by using a VPN to encrypt their internal communications at all times.<\/p>\n<h3>3. Forensics<\/h3>\n<p>This IR team should work to uncover the source of the attack or leak. This process is technically known as \u201cattack forensics\u201d, but in reality can be a lot less complex than that name suggests.<\/p>\n<p id=\"last\">For most organizations, most of the time, this step will involve scanning file systems for malware, and identifying what type of infection you have fallen victim to. You should then immediately update how your phishing filters work in order to avoid the immediate reinfection of your systems.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" data-portal=\"5442029\" data-id=\"4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><span class=\"hs-cta-node hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" id=\"hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<h3>4. Contain and Recover<\/h3>\n<p>The next stage of incident response is to contain any further damage that might have been caused by a successful attack. A security incident \u2013 especially one caused by malware \u2013 is like a forest fire, and unless you take steps to contain it, it can easily spread and cause further damage.<\/p>\n<p>You will need to perform system\/network validation and testing to certify all systems as operational. Recertify any component that was compromised as both operational and secure, and don\u2019t bring crucial components back online until you are positive they pose no further threat.<\/p>\n<h3>5. Stay Up-to-Date with All Your Security Systems<\/h3>\n<p>It is pointless to have a security system in place that you won\u2019t keep up-to-date. However, this is something we see pretty often. The capability of attackers is increasing regularly and <a href=\"https:\/\/www.cnbc.com\/2020\/07\/29\/cybercrime-ramps-up-amid-coronavirus-chaos-costing-companies-billions.html\" target=\"_blank\" rel=\"noopener noreferrer\">scams continue to evolve<\/a>, which means you always need to have the latest release of definitions or software to stay protected.<\/p>\n<p>This goes not just for your company-owned mobile devices, but for all the available technology in the office. Numerous case studies in web application design have revealed the best practices for how web applications can be kept more secure from hackers. This includes making it so that your web applications will run with the fewest-possible privileges to reduce vulnerabilities, and avoiding third-party themes and plugins.<\/p>\n<h3>6. Assess the Damage<\/h3>\n<p>Once the smoke starts to clear, it\u2019s time to assess the damage. You should take a holistic approach to this, in order to capture the full range of consequences of a successful attack. Further, you should also review the pros and cons of launching a full-fledged <a href=\"https:\/\/www.exabeam.com\/incident-response\/cyber-attribution-essential-component-of-incident-response-or-optional-extra\/\">cyber attribution investigation<\/a>, which will help to protect you against similar threat vectors in the future.<\/p>\n<p>Don\u2019t just look at the cost of a data breach to your business, but factor in the monetary consequences of any extra systems you put in place as a result of the hack; at a time when <a href=\"https:\/\/thetokenist.io\/financial-statistics\/\" target=\"_blank\" rel=\"noopener noreferrer\">business debt is rising<\/a>, added expenditure on cybersecurity systems is often the most damaging outcome of an attack.<\/p>\n<h2>The Bottom Line<\/h2>\n<p>As we've pointed out elsewhere, staying safe from cyberattacks, and particularly staying <a href=\"https:\/\/www.msp360.com\/resources\/blog\/anti-phishing\/\">safe from phishing<\/a>, requires constant vigilance. However, you should also recognize that getting hacked is not \u2013 necessarily \u2013 a sign of failure. Instead, remember that all organizations get hacked and that the mark of success is what you do afterward. Respond well \u2013 as we've shown you above \u2013 and no one will blame you for falling victim to a breach. Just don't let it happen again.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you run a small business (or even a large one), you probably spend a significant amount of time thinking about how to protect yourself from cyberattacks. This is, of course, time well spent. You definitely need to understand ransomware attack scenarios, how phishing attacks work, and how to prevent social engineering attacks.<\/p>\n","protected":false},"author":66,"featured_media":44950,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,885],"tags":[],"class_list":["post-44946","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles","category-other"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/44946","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/66"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=44946"}],"version-history":[{"count":4,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/44946\/revisions"}],"predecessor-version":[{"id":61406,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/44946\/revisions\/61406"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/44950"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=44946"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=44946"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=44946"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}