What Not To Do When You’ve Been Hacked

We also have this information in video format.

Ok, you got hacked, now what?

Ok, first of all, got a cyber response plan? Use it. If you don't? Then if you have cyber insurance, contact your insurance people. If you're not sure, contact your IT support folks.

If you're still not sure, contact Simplex-IT. But don't start "fixing the problem”. You actually could make it worse. A lot worse.

Because here’s the situation: Your organization got hacked. Malware. Ransomware. Destruction of data. Bad news. What should you do? Restore your data? Wipe the infected computers and start over?

In a word, NO. Here’s the problem. Technically your network, your IT…is a crime scene. So, restoring data? Wiping infected computers? You’re essentially destroying evidence. And that might void what coverage you have, depending on your cyber insurance policy.

Here’s the thing. Without professional and appropriate guidance, you might destroy evidence. You might restore data without removing the actual hack. You might remove information that could help you figure out what vulnerability was actually compromised.

A cyber response plan is an important part of your organization’s plan to respond to a security issue. And make sure it’s developed with the assistance of that professional and appropriate guidance we were talking about.

Adam Evans, CISSP

About Adam Evans, CISSP

Adam is a seasoned cybersecurity professional with more than a decade of experience in the MSP industry. He started his career as a helpdesk engineer and worked his way up through various technical roles to specialize in cybersecurity – specifically GRC, security architecture, and defensive operations. 

Adam is passionate about sharing his expertise and insights with the next generation of security professionals. He believes that by working together and sharing knowledge, we can make the world a safer and more secure place for everyone.

Connect with Adam on LinkedIn: https://www.linkedin.com/in/grcadame/

Previous
Previous

Using the SLAM Method to Recognize Spam 

Next
Next

Will My Unsupported Microsoft Exchange Still Work?