Here’s What to Do When IT Security Is Compromised.

When IT security is compromised, whether due to a breach, malware infection, or other threats, immediate action is crucial. This blog post will guide you through the steps to take during a computer emergency, ensuring a swift and effective response to safeguard your digital assets.


Immediate Actions

If you suspect a security breach, unauthorized access, or malware infection, take action promptly. Here are the steps you should take immediately:

1. Identify the Compromise

The first step in addressing a computer emergency is to identify the compromise. Look for signs like unusual system behavior, error messages, security alerts, or unexpected system alerts.

2. Disconnect from the Network

In many cases, the compromise may still be actively affecting your system. To prevent further damage or unauthorized access, disconnect your computer from the network. Unplug the Ethernet cable or disable Wi-Fi to isolate your device. BE CAREFUL NOT TO DELETE EVIDENCE; Do NOT turn off devices, delete, or overwrite anything!

3. Contact Your IT/Cybersecurity Team or Provider

If you have an IT team or an IT service provider, reach out to them immediately. They can offer guidance and support specific to your systems and organization. If you're in a small business or don't have an IT team, consider engaging a cybersecurity incident response company like us! 

Depending on the severity of the breach, your IT team or IT Service provider may opt to hire a cybersecurity Incident Response (IR) provider. If you file a cyber insurance claim they may also send out a “data breach coach” (attorney) who may hire a cybersecurity IR company.

4. Preserve Evidence

Before taking any further actions, it's essential to preserve evidence of the compromise. This evidence may be crucial in identifying the source of the breach and addressing any legal or regulatory issues. Document all unusual system behavior and take screenshots if possible. Your IT team or the Cybersecurity Incident Response company will need this evidence to investigate and determine what happened and the extent of the security breach, and also for any cyber insurance and possible litigation.


Investigation: What happened?

You IT team and/or Incident Response Team Should take the Following Steps Depending upon the Nature and Severity of the Cybersecurity Breach.

1. Scan for Malware

If malware is suspected, conduct a comprehensive malware scan using reputable antivirus and anti-malware software. Remove any identified threats. Ensure that your security software is up to date to enhance its detection capabilities. 

2. Review System Logs

Examine system logs, event logs, and/or activity logs to identify any unusual or unauthorized activities. This step can help you understand the extent of the compromise and the potential vulnerabilities in your security measures. This will be done on the computers, servers, cloud accounts, firewalls, and other security controls.

3. Conduct other Digital Forensics:

They may use forensic tools to correlate logs and events, analyze the malware, and perform deep inspection of infected systems. Here’s another blog article to understand digital forensics more.

4. Documentation:

If the breach has legal or cyber insurance implications, they will take the evidence and store it in a controlled environment; it is crucial to maintain and prove the chain of custody and integrity so that the evidence is legally admissible.

Recovery & Remediation: Getting Back to Normal

They should take the following steps now that the team knows what happened, depending on the nature and severity of the security breach:

1. Patch and Update Software

Ensure that all your software, including the operating system and applications, is up to date with the latest security patches. Vulnerabilities in outdated software can be exploited by cybercriminals.

2. Change Passwords, Credentials, Keys, and other Secrets

Change your passwords for all affected accounts, starting with your most critical ones, such as email, financial, and administrative accounts. Use strong, unique passwords, and enable two-factor authentication wherever possible to enhance security.

3. Delete Malware or Wipe Systems and pull from Backups

Deleting malware from your computer is a critical step in restoring its security. They should:

  1. Identify the Malware: First, identify the malware or suspicious files on your system. Use reputable antivirus or anti-malware software to scan your device thoroughly.

  2. Quarantine Malicious Files: When the software identifies malware, it often quarantines the files. Quarantining isolates the malware, preventing it from causing further damage.

  3. Remove Quarantined Malware: After quarantining, review the identified files in your antivirus or anti-malware software. Confirm that they are indeed malicious, then delete them.

  4. Reboot and Rescan: Reboot your computer and perform a second scan to ensure that all traces of malware have been removed.

  5. Update Software: Keep your operating system, antivirus software, and all applications up to date. Updated software is less vulnerable to malware.

  6. Enhance Security: To prevent future malware infections, strengthen your security measures, and maintain safe browsing habits.

  7. Wipe Systems: They may also opt for a more failsafe option and wipe/reset the systems and pull from the last clean backups.

Remember, deleting malware is just one aspect of a comprehensive cybersecurity strategy. Regularly backup your data, use strong, unique passwords, and stay vigilant to stay protected against evolving threats.

4. Implement Security Best Practices

Review your organization's security best practices and policies. Ensure that your systems are configured in line with security guidelines and that employees are aware of security protocols.

Use the lessons learned from the compromise to strengthen your IT security measures. This may involve enhancing your firewall, intrusion detection systems, and implementing more robust access controls.

Consider hiring a cybersecurity company like us to conduct a full cybersecurity audit and review for any security holes or poor security practices.

5.  Educate Your Team

Provide security awareness training for your team. Educate them about the latest threats and the role they play in maintaining the organization's security.

6. Continuous Monitoring

Continuous monitoring after a breach is crucial to ensure that your systems remain secure. Commonly cyber criminals engineer ways to stay persistent in IT networks despite best practices by IT and Cybersecurity Teams. Cybercriminals often retarget their victims.

By consistently observing network traffic, system logs, and user activities, you can quickly detect and respond to any suspicious behavior, further strengthening your cybersecurity posture and preventing future breaches. Regular monitoring also helps identify potential vulnerabilities and proactively address them, reducing the risk of future security incidents.

A computer emergency can be a stressful experience, but a swift and well-coordinated response is vital in minimizing damage and preventing future incidents. By following these steps and seeking professional assistance when needed, you can navigate a computer emergency with confidence and protect your digital assets.

Previous
Previous

Data Breach: Determining What Data Was Accessed?

Next
Next

Signs your Browser is Compromised (hacked)