Crises communications for the cybersecurity age

Preparing for a cyberattack has unfortunately become the sort of eventuality every CISO and IT need to recognize. While it is not something anyone wants to do, it is becoming necessary because it is no longer “if” your system will suffer an attack, but “when.”

But imagine if IT was able to coordinate their response during a cyberattack so that the impact of business interruptions was managed?  This blog offers some insights on how to do just that by:

  • Highlighting the need for strong communication protocols
  • Looking into what a plan needs to encompasses
  • Examining the components of a strong post-attack plan

Employ robust communication protocols and devices

Most companies rely on internal email to communicate in the event of a crisis, despite the fact that a cyberattack might impact the email network itself. They also rely on phone and fax although those technologies are also easily compromised during an attack.

Ideally, the technology resorted to in the event of an attack will be a secure, cloud-based, robust platform for communication than can be used on a smartphone. By having a cloud-based platform, the communication channel will not be under attack like the rest of the company’s communications tools which are PC-based.

While it is important to scrutinize the security of smartphones, it should be noted that the security of smartphone devices is much easier to update than that of typical laptops and desktops. Smartphones are isolated from these concerns and, with proper protocols in place, can have security updated much more easily.

Establish a plan

Given the knowledge that they could easily be a target, companies need to plan for the unexpected. More importantly, they need to consider how best to ensure critical functionality and communications in the event of a cyberattack. Readiness spells the difference between an organization that suffer major breaches with harmful effects and an organization that will recover quickly with minimal impact.

The importance of having a plan for communications during an attack cannot be overstated. Communication plans need to provide instructions for how team members will be notified and updated during the attack. In the process of executing on this plan, teams need to use a strong incident alert management platform. By using this sort of secure platform, users have access to encrypted messaging that is unreadable by anyone other than the intended user and recipient. An application (like OnPage) provides end-to-end encryption to secure messaging from the sender all the way to the receiver. Through this method, the confidentiality of the message remains intact at all times.

Post attack plan

A post-mortem analysis should be part of your incident response plan.  Teams should schedule a post-mortem as soon after the incident as possible so that recall and responses taken are not forgotten.

Make sure your team has a reporting engine in place to record messages, time stamps of when messages were received, and records of incident acknowledgements. By having a post-mortem report with this information, businesses can translate it into a positive working plan to protect against future attacks.

Conclusion

Cybersecurity incidents are a persistent menace. Businesses need to consider incident response plans that address the possibility of degraded operation while also considering how to achieve an efficient restoration and recovery. Clearly, maintaining strong communications during the course of the cyberattack is an important part of returning to business as normal.  To achieve this goal, businesses are best served by employing encrypted cloud-based communications.

To read more about how your company can prepare for robust communications during a cyberattack, download our whitepaper Secure IT Communications When You WannaCry.

.

OnPage Corporation

Share
Published by
OnPage Corporation

Recent Posts

Site Reliability Engineer’s Guide to Black Friday

Site Reliability Engineer’s Guide to Black Friday   It’s gotten to the point where Black Friday…

6 days ago

Cloud Engineer – Roles and Responsibilities

Cloud engineers have become a vital part of many organizations – orchestrating cloud services to…

4 weeks ago

The Vitals Signs: Why Managed IT Services for Healthcare?

Organizations across the globe are seeing rapid growth in the technologies they use every day.…

1 month ago

How Effective are Your Alerting Rules?

How Effective Are Your Alerting Rules? Recently, I came across this Reddit post highlighting the…

1 month ago

Using LLMs for Automated IT Incident Management

What Are Large Language Models?  Large language models are algorithms designed to understand, generate, and…

2 months ago

OnPage Lands Spot on Constellation ShortList™ for Clinical Communication in 2024

Recognition highlights OnPage's commitment to advancing healthcare communication through new integrations and platform upgrades. Waltham,…

3 months ago