You Can’t Afford To Overlook Security Incident Response

By Kevin Beaver|2022-05-11T16:49:16+00:00November 22nd, 2018|0 Comments

Incident response – the art and science of responding to computer and network security breaches – is an often overlooked component of business continuity. For whatever reasons, the procedures associated with handling network intrusions and insider shenanigans are often put aside until the you-know-what hits the fan. In the relatively small number of enterprises I come across that do have a viable incident response plan, it’s often not properly integrated with the business continuity function.

When performing my security assessments, I’ve seen some interesting gaps in information risk management programs. One of the most common gaps is the assumption that a business continuity plan that deals with the physical side of IT is sufficient. It’s simply not true. You’ve got to be prepared to address security incidents across the board from your network infrastructure to your servers, databases, applications and mobile devices – really any system or device that can lead to an information security incident.

Security incidents show up in the headlines and breach statistics databases such as the Chronology of Data Breaches (www.privacyrights.org) on a seemingly daily basis. Imagine if you simply spent a bit of time up front putting together some incident response procedures so you can respond to issues that arise in a professional and methodical manner? Interestingly that’s all it takes. I’d venture to guess many of the businesses who’ve been on the receiving end of these breaches wish they had put a better flight plan in place beforehand.

At their core, security incidents are made up of three components:

  • A stimulus (i.e. an external hacker or malicious insider)
  • An outcome (i.e. a vulnerability being exploited)
  • A consequence (i.e. the exposure of sensitive business data) Some of the significant issues are:
  • Phishing attacks and related malware outbreaks that create network infections
  • Weak passwords that lead to unauthorized access
  • Lost or stolen laptops and smartphones without encryption or passwords

All of these incidents can be carried out by an external attacker or rogue insider with very few resources required of them. Keeping incident response out of the business continuity loop can compound these problems ten-fold. In other words, if you don’t consider incident response as part of your overall business continuity program, and an incident occurs, then you’ll no doubt get hit with some unexpected incident response and investigation costs.

12p_093

The priority is to make sure you’ve fully documented your environment and you’re keeping all the proper systems on your radar for incident monitoring. Next, do what you can to ensure your business has a reasonable set of incident response procedures so that the what, when, where, why and how of security incidents are properly covered.

These things can happen on your own LAN or they can happen in the cloud. Think long term about how you’re going to respond. Gain control of incident response and make sure you’re doing it well. As the saying goes “good enough” hardly ever is.

 

Recommend0 recommendationsPublished in IT Availability & Security

Share This Story, Choose Your Platform!

About the Author: Kevin Beaver

Kevin Beaver is founder and principal consultant of Atlanta, GA based Principle Logic, LLC. With over three decades of IT experience, Kevin is an information security consultant, writer, and professional speaker who specializes in security vulnerability and penetration testing and virtual CISO consulting. He is author of the best-selling book Hacking For Dummies (now in its sixth edition) and co-author of the popular HIPAA book The Practical Guide to HIPAA Privacy and Security Compliance (now in its second edition). Kevin can be reached at his website: www.principlelogic.com

Leave A Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.