Data Breaches are a Question of When, Not If

Data Breaches are a Question of When, Not If

Target, Home Depot, and Equifax. What do these three businesses have in common? They've all suffered a major data breach in the last 5 years.

We hear reports of big cyber attacks on large corporations, and even government agencies, with alarming regularity. The trouble with this news coverage is where it suggests cyber attacks are taking place. These attacks are not solely hitting large organizations; small firms represent a significant portion of those who face cyber attacks. Being small by no means keeps you immune. In fact, small firms can be used as conduits to larger organizations, such as is likely what happened in the case of Target Corporation back in 2013

If you're a small business, then you're a target for cyber criminals. Last year, 71% of small to medium size businesses were the victims of at least 1 cyber attack. 

Today's concern is how you would respond to an attack. 31% of small to medium businesses do not have a plan of action for responding to IT security breaches, and 22% admit that they lack the expertise to make such a plan. A data breach can be disastrous for a fortune 500 company, what do you think it does to a 10 person Real Estate Office?

So how should you respond? Your response determines whether it's a survivable disaster, or the end of the line. You need to have a statement for customers ready, (47 states require businesses to disclose data breaches), you need to immediately rectify the cause of the breach, you need to be able to quickly access backups, and you need access to professionals with experience in disaster recovery and business continuity.

Hopefully, you've engaged the services of an experience IT firm prior to the breach, as onboarding can take 2-4 weeks; precious time you can't afford to waste when your systems are potentially compromised. If that firm was doing their job, they'll have a solid business continuity appliance, like a Datto Siris or Alto3, in place. This will allow you to restore a compromised system to a secure state. 

Each breach is different in nature as well as scope. You could have 1 compromised system, or 20. If you'd like to see how ROI Technology Inc. can help protect you from some breaches, while mitigating others, fill out the form below for a free security assessment. 

Like & follow ROI Technology Inc. on social media for contests, free e-guides, and more!