The financial, social and organizational effect a breach incident has on your organization will largely be based on the established plan your organization has in place as well as your current preventive security measures. Our Breach Readiness Assessment reviews your organization’s current practices to establish a specific plan that addresses the requirements of Board members, technology stake-holders, staff and your technical implementations.
In a study of security breaches in 2015, hacking incidents reached a nine-year high of 37.9%, a jump of 8.4% over 2014 figures. This was followed by employee error/negligence at 14.9%, more than double the 7.2% first reported in 2012.
Accidental e-mail/internet exposure was the third most common source of compromised data at 13.7% followed by insider theft (10.6%), physical theft (10.5%) and subcontractor/3rd party (9.0%). Data on the move was the final culprit, with 7.3% of the reported breaches occurring in this manner, down from a record high of 27.6% in 2007.
Each Breach Readiness Plan is defined in audience-oriented sections with specific pre- and post-breach response activities, goals, logic and values. Plans are reviewed and where plausible, tested by CYPFER security professionals. We take into consideration:
- Methods to enhance a forensic investigation including anti-forensic methods and tactics.
- Understanding your critical assets; recognizing the tangible value of digital assets.
- Review and validate business continuity plans.
- Management of supplier access to your systems and services.
- Validation of your e-mail polices.
- The facts, pros and cons of cyber insurance for your organization.
- Strategic plans, timelines and milestones in a cyber breach incident.