SHARE
Facebook X Pinterest WhatsApp

Five Critical Steps for Handling a Security Breach

We have long since passed an era when 100 percent prevention of security breaches was even remotely possible, especially when it only takes a single, seemingly harmless activity — such as an employee clicking a link, using an insecure Wi-Fi connection, or downloading a corrupted software update — to unleash a full-scale infection. This, however, […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Jul 11, 2014

We have long since passed an era when 100 percent prevention of security breaches was even remotely possible, especially when it only takes a single, seemingly harmless activity — such as an employee clicking a link, using an insecure Wi-Fi connection, or downloading a corrupted software update — to unleash a full-scale infection.

This, however, doesn’t mean your enterprise is helpless and vulnerable. On the contrary, you can dramatically improve your ability to avoid disaster and mitigate damage if you take the right actions. In this slideshow, Seculert outlines five critical steps for handling a security breach.

Seculert provides an integrated platform that identifies resident, active threats that have evaded existing perimeter defenses and breach detection systems.

Five Critical Steps for Handling a Security Breach - slide 1

Click through for steps you can take to dramatically improve your ability to avoid disaster and mitigate damage when dealing with a security breach.

Five Critical Steps for Handling a Security Breach - slide 2

Identify the attack

It’s important to identify which system, services and devices have been compromised. For example, corporate email, online customer login pages, shared drives, etc. Ask yourself, who is the target within your organization? Does it stem from a host on your network, or is it coming from outside your perimeter?

Don’t forget to gather information about the command and control servers that were used in the attack, e.g., IP addresses, domain names, etc.

Determine the type of attack, is it a data stealer, DDoS, remote access, etc.?

Is it targeted specifically for your company? Your industry? At a product or service you use? What was/is the agenda of the attack – economic, social, political, etc.?

Five Critical Steps for Handling a Security Breach - slide 3

Quarantine the damage

Prevent spreading the attack to others and causing further damage by isolating compromised endpoints and assets. You cannot take your network offline, because that would hurt business. Quarantine only the infected servers, computers and devices.

Tip: In quarantine, they can be examined, remedied and brought back online.

Five Critical Steps for Handling a Security Breach - slide 4

Disinfect

Now that the infection has been quarantined, it’s time to get out your rubber gloves. Compare pre-infection and post-infection backups. Start with the most critical systems first. Remember that a network breach is considered a crime, so try not to destroy valuable evidence.

Tip: Make safe, stable copies of any illegal content and store on an isolated system, preventing accidental re-infection. Consult with your corporate legal counsel and ensure that you have the most up to date and accurate advice.

Five Critical Steps for Handling a Security Breach - slide 5

Develop a communication plan

Legally, you may need to disclose the attack, if not publicly, then at least to those potentially affected, e.g., customers, partners or other stakeholders. Decide if sharing information at this point is a necessary public relations move. There are professionals who specialize in the field of network security breaches, e.g., PR communications professionals and lawyers.

Five Critical Steps for Handling a Security Breach - slide 6

Re-secure the network

Before putting any server, computer or device back online, check, double-check and triple-check. All compromised or potentially compromised passwords should be changed.

Tip: New passwords should incorporate best practices for strength and security. Check for configuration errors, download and install the latest security patches. Update network hardware security settings. Don’t forget the human factor. Educate all employees on how to play an active role in maintaining network security.

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.