Wednesday, August 24, 2011

Data Breach Response Best Practices

Data Breach Response Best Practices

Cyber Security Auditors & Administrators (CSA2) web page addresses data breaches and the best practices to address your risk exposure.

With so many breaches occurring each year, what happens if your company experiences a breach?  Most large companies are taking the necessary measures to prevent security breach incidents.  Breaches have almost become business as usual.  It is a “numbness” of sorts.  We hear so much about data loss, that is seems ordinary.

Ordinary of course until it happens to your organization.  No organization is immune.  Breaches can be accidental or intentional.  Regardless of how they occur, preventative measures, no matter how advanced the security technology is or extensive the resources are, offer no guarantees.

Breaches can also be costly events when you factor in losses such as lost business, fines and litigation costs, lost shareholder value and reputation damage.  The single largest cost component is the loss of business from a tarnished reputation. 

What distinguishes one breach from another is the post-breach response.  Like a fire drill, preparedness makes the difference.  Open communication with those affected is critical.  No one likes to be left in the dark.  If breaches are common today, the response and respect to those affected make the difference of survival. 

CSA2 works with organizations to help them prepare and maintain a Written Information Security Plan (WISP) and offer solutions to protect that plan from its own breach with their proprietary WISP-Vault.

Dolvin Consulting in partnership with CSA2 offers comprehensive risk analysis and management solutions.  Contact us to see how we can help.

No comments:

Post a Comment