ADVERTISEMENT

How to effectively respond to a data breach

Published Oct 29, 2018 12:00 am
By Mon Nunez Untitled Breaches in IT security are daily occurrences worldwide, with only just the most brazen or careless ones getting the attention of the affected organization - much less the public. This is not surprising since organizations rarely have properly trained and dedicated people to defend an IT infrastructure - a system that grows more complicated by the year against attackers who focus on nothing else but to compromise an organization’s barriers. With this, modern organizations are now starting to accept that the question is not “if” they will be breached, but rather “what should I do when I am breached?” Likewise, IT security professionals have shifted their focus to not only securing the infrastructure, but also ensuring that their organization has enough “eyes” and “ears” throughout the network so that a breach can be handled by IT departments without running blind in the dark. Acceptance of the fact that a data breach is a possibility at any given time is not enough, as this compromise may cause severe damage to a company’s reputation, which may lead to a huge loss for the business. You also need to know what makes an effective response to a corporate data breach, or any serious security incident for that matter. To do this, let me introduce you to: The Six Phases of Incident Response and Their Basic Activities 1.First phase is Preparation. This should be done before a breach occurs. Preparation is the critical step which determines whether or not your organization will be able to handle a data breach correctly. Ideally, your organization should have an escalation protocol in place, which clearly identifies who should be in the know, who the point person of an investigation is, and who in the upper management would be responsible for handling this type of incidents. In the Philippines, it is also vital to be able to assess at what point should you notify the National Privacy Commission (NPC) when Personal Identifiable Information (PII) are involved, and when you should contact law enforcement. For external assistance, the most important roles usually fall under a Technical Expert, a Lawyer, and a Crisis PR Specialist. Having those points of contact in place and knowing how to reach them are important and should be part of your organization’s data breach protocol. 2.Second phase is Identification.You need to be able to identify, validate, and collect evidences to have a working idea on the scope of the breach and be able to act on it accordingly. 3.The next phase called Containment is when you try to isolate the scope of compromise while preventing it from spreading. This includes isolating compromised or suspicious machines to prevent further spread of the attack within your organization. This is done while ensuring proper collection and handling of network, memory and disk information so they would not be unnecessarily modified, or worse, deleted. 4. The fourth phase would be Eradication. After collecting evidences, figuring out the entry point, identifying the scope of damage, and containing the systems, the affected machines will now be reverted back to a known safe state. If this is not possible, you will need to do a full reinstall. 5. Either way, these would all have to be patched and monitored for any re-intrusion attempts in the fifth phase - Monitoring and Recovery. 6. The last phase is aptly called “Lessons Learned”. Blame would be a waste of energy at this point. Your efforts will be better utilized in recounting and evaluating all activities and events that transpired, and in improving your current system and data breach protocols. That way, you’ll be more confident that your organization will be less vulnerable in the next attack. Remember, for each of the six phases, your organization should always have a procedure or escalation protocol in place which clearly identifies who should be involved, who should know, what to do, and when to seek out external help. This reminder is brought to you by Information Security Officers Group (ISOG), in celebration of Cybersecurity awareness month, I AM SECURE 2018. --- About the author Raymond “Mon” Nuñez is a member of ISOG and provides security consulting with a special focus to financial services, government systems, and telecommunications industries, while teaching Computer and Network Security for graduate students in the University of the Philippines, Diliman. He is currently taking his PhD in Computer Science in UP Diliman. Mon and his teammate Siege on the much coveted Black Badge at DEF CON 24 in Las Vegas for winning the CTP Contest. Aside from bragging rights, they now enjoy free for life access to the yearly DEF CON. As a form of entertainment, Mon regularly takes certifications such as CISA, CISM, GSEC, GNFA, GXPN, GWAPT, GCIH, GCDA, GMON, and GASF.
ADVERTISEMENT
.most-popular .layout-ratio{ padding-bottom: 79.13%; } @media (min-width: 768px) and (max-width: 1024px) { .widget-title { font-size: 15px !important; } }

{{ articles_filter_1561_widget.title }}

.most-popular .layout-ratio{ padding-bottom: 79.13%; } @media (min-width: 768px) and (max-width: 1024px) { .widget-title { font-size: 15px !important; } }

{{ articles_filter_1562_widget.title }}

.most-popular .layout-ratio{ padding-bottom: 79.13%; } @media (min-width: 768px) and (max-width: 1024px) { .widget-title { font-size: 15px !important; } }

{{ articles_filter_1563_widget.title }}

{{ articles_filter_1564_widget.title }}

.mb-article-details { position: relative; } .mb-article-details .article-body-preview, .mb-article-details .article-body-summary{ font-size: 17px; line-height: 30px; font-family: "Libre Caslon Text", serif; color: #000; } .mb-article-details .article-body-preview iframe , .mb-article-details .article-body-summary iframe{ width: 100%; margin: auto; } .read-more-background { background: linear-gradient(180deg, color(display-p3 1.000 1.000 1.000 / 0) 13.75%, color(display-p3 1.000 1.000 1.000 / 0.8) 30.79%, color(display-p3 1.000 1.000 1.000) 72.5%); position: absolute; height: 200px; width: 100%; bottom: 0; display: flex; justify-content: center; align-items: center; padding: 0; } .read-more-background a{ color: #000; } .read-more-btn { padding: 17px 45px; font-family: Inter; font-weight: 700; font-size: 18px; line-height: 16px; text-align: center; vertical-align: middle; border: 1px solid black; background-color: white; } .hidden { display: none; }
function initializeAllSwipers() { // Get all hidden inputs with cms_article_id document.querySelectorAll('[id^="cms_article_id_"]').forEach(function (input) { const cmsArticleId = input.value; const articleSelector = '#article-' + cmsArticleId + ' .body_images'; const swiperElement = document.querySelector(articleSelector); if (swiperElement && !swiperElement.classList.contains('swiper-initialized')) { new Swiper(articleSelector, { loop: true, pagination: false, navigation: { nextEl: '#article-' + cmsArticleId + ' .swiper-button-next', prevEl: '#article-' + cmsArticleId + ' .swiper-button-prev', }, }); } }); } setTimeout(initializeAllSwipers, 3000); const intersectionObserver = new IntersectionObserver( (entries) => { entries.forEach((entry) => { if (entry.isIntersecting) { const newUrl = entry.target.getAttribute("data-url"); if (newUrl) { history.pushState(null, null, newUrl); let article = entry.target; // Extract metadata const author = article.querySelector('.author-section').textContent.replace('By', '').trim(); const section = article.querySelector('.section-info ').textContent.replace(' ', ' '); const title = article.querySelector('.article-title h1').textContent; // Parse URL for Chartbeat path format const parsedUrl = new URL(newUrl, window.location.origin); const cleanUrl = parsedUrl.host + parsedUrl.pathname; // Update Chartbeat configuration if (typeof window._sf_async_config !== 'undefined') { window._sf_async_config.path = cleanUrl; window._sf_async_config.sections = section; window._sf_async_config.authors = author; } // Track virtual page view with Chartbeat if (typeof pSUPERFLY !== 'undefined' && typeof pSUPERFLY.virtualPage === 'function') { try { pSUPERFLY.virtualPage({ path: cleanUrl, title: title, sections: section, authors: author }); } catch (error) { console.error('ping error', error); } } // Optional: Update document title if (title && title !== document.title) { document.title = title; } } } }); }, { threshold: 0.1 } ); function showArticleBody(button) { const article = button.closest("article"); const summary = article.querySelector(".article-body-summary"); const body = article.querySelector(".article-body-preview"); const readMoreSection = article.querySelector(".read-more-background"); // Hide summary and read-more section summary.style.display = "none"; readMoreSection.style.display = "none"; // Show the full article body body.classList.remove("hidden"); } document.addEventListener("DOMContentLoaded", () => { let loadCount = 0; // Track how many times articles are loaded const offset = [1, 2, 3, 4, 5, 6, 7, 8, 9, 10]; // Offset values const currentUrl = window.location.pathname.substring(1); let isLoading = false; // Prevent multiple calls if (!currentUrl) { console.log("Current URL is invalid."); return; } const sentinel = document.getElementById("load-more-sentinel"); if (!sentinel) { console.log("Sentinel element not found."); return; } function isSentinelVisible() { const rect = sentinel.getBoundingClientRect(); return ( rect.top < window.innerHeight && rect.bottom >= 0 ); } function onScroll() { if (isLoading) return; if (isSentinelVisible()) { if (loadCount >= offset.length) { console.log("Maximum load attempts reached."); window.removeEventListener("scroll", onScroll); return; } isLoading = true; const currentOffset = offset[loadCount]; window.loadMoreItems().then(() => { let article = document.querySelector('#widget_1690 > div:nth-last-of-type(2) article'); intersectionObserver.observe(article) loadCount++; }).catch(error => { console.error("Error loading more items:", error); }).finally(() => { isLoading = false; }); } } window.addEventListener("scroll", onScroll); });

Sign up by email to receive news.