Data breaches happen, but they aren’t necessarily the end of a company. In many cases a breach can be an inflection point, with the company coming back stronger. With a data breach response plan, companies have a better chance of mitigating the negative consequences of a breach.
Following the news of the Equifax breach in September 2018, the stock price dropped from $140 to $90; within 6 months it rebounded to $115...and as of this month, it's north of $140. And other companies like Sony, Facebook, and Verizon have bounced back as well.
By following these best practices for a data breach response plan, companies are able to retain business, customers, and shift brand perception in the market.
1. Prepare with a Data Breach Response Plan.
While breaches may vary in nature, having a solid blueprint to organize can streamline a timely response. First, recruit the key organizational players that should be involved. Who should be on your incident response team? Typical players include Human Resources, Legal, Governance, Business Continuity Officers, Information Technology, Security, and Communications – but it varies based on your organization. Gathering the stakeholders and documenting a response plan with detailed actions and owners ensures a defined path for the initial steps. Don’t forget to include a list of additional partners to engage such as authorities, law firms, PR firms, and security teams to specialize in breach incident and response.
2. Be transparent and timely.
Large breaches don’t remain secrets for long, and the timeframe of exposure is a measurement in the public eye. It is important to ensure rapid communication and response to breaches. Communicate within the organization, as well as with customers and partners who could be affected, with clarity on what happened and next steps. Work with any applicable regulatory bodies to ensure adherence to laws or regulations. For example, a GDPR incident response plan would ensure disclosure to the proper authority within 72 hours of discovering the occurrence of a breach (Article 33). Failure to do so could subject your organization to hefty fines. A good rule of thumb is having a 24-48 hour response plan – especially if personal data was breached, or user credentials might be compromised. Ensure that you are releasing information quickly, and advising customers on options or actions that could limit or eliminate exposure.
3. Construct your communication strategy.
The majority of breaches’ initial assessments underestimate the overall impact. Given this factor, it’s important to assume worst cases and begin to reach out proactively. This could mean credit reporting companies, financial companies, and theft protection services, along with PR and the news media. A fantastic tactic to have prepared are email templates that could provide communication across the digital landscape (social media, email, website, response/KB articles with details, blogs), along with your press release and any customer portals you may have.
4. Identify the root cause beyond the technical aspects.
Ascertaining the technical details of a breach is critical. Understanding how people interact with technical tools is paramount to understanding breaches – including but not exclusive to phishing. Whether it's upkeep, maintenance/patching, best practices in architecture, audit/reporting, data model flow mapping, identity/credentials and access management, or beyond – it involves people and business processes. Understanding the human element involved is essential to meet ing the challenge of security.
5. Strengthen your posture, don’t just remediate.
Developing a robust security posture is an ongoing effort. Immediate remediation steps are important, but it’s more crucial to look at risk exposure over time to ensure data and IP protection. This could take the form of response planning for the security organization, or instituting coaching to fortify the data protection strategy. It takes long-term investment: Target didn’t just eliminate the login credential exposure and focus on wireless network strategy within the stores, it rolled out EMV-compliant POS terminals and re-issued REDcards with Chip-and-PIN over an extended timeframe. And their stock price recovered from $55 (Dec 2013), to $60 within 6 months.
Securing an organization is like competing in a track meet: there are a variety of challenges, from immediate, short-term needs like sprints and hurdles, to the endurance and strategy required for long distance events, to the specialized skill-sets required for events like the shot put and pole vaulting. It takes long term strategy, planning, and partnering with the right team to create a winning legacy -- equating to long-term brand equity. Wherever you are in your journey as an enterprise, whether you are racing to the cloud or focusing on safeguarding critical IP in a new service or offering, Forcepoint continues to invest in new innovation around data protection to partner with organizations on their overall security approach. Let us know how we can help!
Karlene Berger - 11 October 2019
Do you want to learn more about this subject, or do you have specific questions? Don't hesitate and reach out! Speak with a solutions expert or architect. Give us a call or leave a message. Our team of Forcepoint technical experts are ready for your inquiries.
Director of Product Marketing at Forcepoint