WhatsApp Contact

Experiencing a Cyber Attack

If you are experiencing a potential cyber-attack, your systems have been confirmed as breached, or you have indications that your security, email or data has been compromised, there are so many variables involved, you need to urgently speak to your internal IT or Security team or consult a cyber security comapny who specialise in incident response to avoid any further disruption and damage.

This incident requires immediate and top priority action, the speed of identification and reporting requires ideally following your business disaster recovery plan actions, like potentially disconnecting from the internet and full system password resets for example depending on the type of attack and if a breach has happened involving administrator level credentials.

Recent, full and comprehenicve back up's will be critical in the event of a cyber attack to help restore the business back to an operational business as usual status but these have to be validated to ensure the recovery back up is not also compromised by the cyber criminals.

We have compiled some additional information below to assist 

Steps to Take If You Are Experiencing a Cyber Attack

Detect the Intrusion

Monitor security alerts, logs, and any unusual activity to confirm that a cyber-attack is occurring.

Assess the Scope

Determine which systems, networks, or data have been affected and the severity of the attack.

Isolate Affected Systems

Disconnect compromised systems from the network to prevent the attack from spreading.

Disable Accounts

Temporarily disable user accounts that may have been compromised or are exhibiting suspicious activity.

Alert IT and Security Teams

Immediately notify your IT and cybersecurity teams about the attack.

Inform Key Stakeholders

Communicate with senior management and relevant departments about the situation and the steps being taken.

Remove Malware

Use anti-virus and anti-malware tools to identify and remove malicious software.

Patch Vulnerabilities

Apply necessary patches and updates to fix any security vulnerabilities exploited by the attackers.

Restore from Backups

If necessary, restore affected systems and data from clean, recent backups.

Verify Integrity

Ensure that the restored systems and data are free from malware and fully functional before reconnecting to the network.

Conduct a Post-Mortem Analysis

Investigate how the attack occurred, what vulnerabilities were exploited, and what data was affected.

Document Findings

Record all details of the incident, including the timeline, actions taken, and lessons learned.

Activate Incident Response Plan

Follow your organization’s incident response plan, which should outline the roles, responsibilities, and procedures during a cyber-attack.

Maintain Communication

Keep all relevant parties informed throughout the process, including employees, customers, and partners, as appropriate.

Cooperate with Authorities

Report the incident to police and regulatory bodies if required, and cooperate with their investigations.

Improve Security Posture

After the attack, review and strengthen your cybersecurity measures to prevent future incidents, including updating security policies, conducting regular vulnerability assessments, and training employees on cybersecurity best practices.

 

Reach out to LoughTec for assistance in rectification of the current issues and proactive measures to prevent a cyber attack moving forward, during working hours contact the office via info in Contact Us page and outside office hours reach out to us on business WhatsApp via the green WhatsApp logo and we will endeavour to help.