What NOT to Do After a Data Breach
Without this knowledge, company leaders could end up spreading the fire, rather than smothering it.High profile data breaches continue to appear in the…
July 05, 2017 at 12:16 PM
4 minute read
The original version of this story was published on Law.com
Without this knowledge, company leaders could end up spreading the fire, rather than smothering it.
High profile data breaches continue to appear in the news every day, causing organizations of all sizes anxiety around data protection. With over 10 million records exposed so far this year, as well as the rise in next generation threats like ransomware and malware, organizations can no longer pretend it won't happen to them.
By approaching a data breach as a probability, rather than an impossibility, organizations are better equipped to mitigate damage following a breach. While many have spoken about the steps that should be taken during these first 24-72 hours, the steps not to take often get overlooked. Without this knowledge, company leaders could end up spreading the fire, rather than smothering it.
Ermis Sfakiyanudis, president and CEO of Trivalent, sat down with Inside Counsel to discuss exactly what not to do after a data breach. With 15 years of experience as an executive and entrepreneurial professional, Sfakiyanudis has established himself as a thought leader in the data privacy and business communities.
Industries are digitizing, meaning more and more companies are coming to rely on digital data and cloud computing to access, store and transmit information both inside and outside their organizations.
“With all this data now at their disposal, hackers and other malicious actors have an unlimited amount of opportunities to gain access to valuable data, such as protected health information (PHI) or personal identifying information (PII),” he explained. “Unfortunately, many companies still rely on traditional data protection technology like basic encryption, which has proven to no longer be enough to protect critical data from increasing threats.”
According to Sfakiyanudis, organizations need to think about data protection proactively. With the understanding that their organization will incur a breach, leaders can develop a defense-in-depth approach to protecting critical information, better preparing them to handle threats as they arise. In addition to continuous employee training, evolving security strategies, and a well-communicated incident response plan, companies should consider adopting next generation data protection technology as their last line of defense.
“Companies are not always prepared for security threats and don't realize how quickly a data breach can occur,” he said. “A wrong click of a mouse by an employee could lead to a company-wide breach.”
To ensure company data remains secure, there are a few steps an organization should take, per Sfakiyanudis. First, educate employees on the risks they pose to the company when online and red flags to avoid. Second, stay proactive and make sure all systems are consistently updated. Finally, work with security and/or IT teams to discuss investing in next generation data protection solutions, which go beyond traditional encryption to protect data at the file level through a process of shredding and recombining data for only authorized users.
Since gaps in security strategies are exploited every day, it is important for company leaders to acknowledge their organization may have a similar gap. As businesses learn how to protect data from new threats, hackers quickly adapt in order to infiltrate each new shield put in front of them. “By recognizing a data breach has the potential to occur, and adopting strategies and technology that ensure data stays protected even in the event of a breach, organizations can remain one step ahead of hackers,” he said.
So, what are best practices for organizations to mitigate damage in the crucial hours following a breach?
It is critical that a breached company follows its incident response plan, which should include identifying the suspected cause of the incident as a first step, according to Sfakiyanudis. By determining the cause of the breach, an organization can see where the flaw in their data protection lies. Then, isolate the breached system and eradicate the cause of the breach. And, document everything and log results of investigations through data capture and analysis so they are available for review. Finally, once the threat has been removed, reassess your existing data protection strategies and technology to ensure you are prepared to protect your company data in the future.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllTrump Likely to Keep Up Antitrust Enforcement, but Dial Back the Antagonism
5 minute readFTC Sues Cash-Advance Fintech Dave, Says It Deceives the 'Financially Vulnerable'
Policy Wonks' Obsession: What Will Tuesday's Election Mean for FTC Firebrand Khan?
6 minute readTrending Stories
- 1Infant Formula Judge Sanctions Kirkland's Jim Hurst: 'Overtly Crossed the Lines'
- 2Trump's Return to the White House: The Legal Industry Reacts
- 3Election 2024: Nationwide Judicial Races and Ballot Measures to Watch
- 4Climate Disputes, International Arbitration, and State Court Limitations for Global Issues
- 5Judicial Face-Off: Navigating the Ethical and Efficient Use of AI in Legal Practice [CLE Pending]
- 6How Much Does the Frequency of Retirement Withdrawals Matter?
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250