So you’ve heard there’s been a breach and you’re worried your company’s data might have been stolen? Here's what you can do.
Cyber attacks can happen to anyone, fund administrators Mainspring recently suffered a ransomware attack, MSP solution Kaseya was also victim to a hack and let’s not forget the infamous Solarwinds breach. The point is: data governance and third party risk management can only go so far, these breaches happen (and more often than you think). Don’t blame your supplier, instead help them to respond to the issue as best as possible.
In this guide we’re going to walk you through:
Mostly, they sell it. The initial attacker likely won’t be using the data themselves, they’ll be selling it onto another criminal who can use it for profit. How? A couple of ways:
This is a fancy term for trying out a username and password combination in lots of different systems. If the attackers were able to access your user details for a particular system, they will likely try that same combination in lots of different online accounts - webmail, bank accounts, crypto accounts, social media, home utilities, pension providers etc.
People reuse passwords and attackers know this. They’ll capitalise on it to try and get as much access as possible. Once they’ve got access to your accounts, they’ll try and scam you in whatever way they can: blackmail you, lock you out, or even steal money directly.
How to protect yourself? I know it’s obvious but… change your passwords! Change your password for the system you think has been hacked. But also change your password for anywhere you use that same password, or a similar password. If you used dominoes24 as your password for the breached account, but you use dominoes25 and dominoes26 elsewhere… you’d better change those too. And do it quickly.
When reacting to an attack, don’t be afraid to prioritise accounts. You should first change the password on the system that was breached, then change your email password (if an attacker gets access to your email they can ‘forgot password’ their way into other accounts), and then change any other similar passwords.
Once an attacker has access to your account, the first thing they’ll likely do is change your password, so you can’t get back in. On a side note - it’s a really bad idea to reuse passwords, for exactly this reason.
Most people reuse passwords because it’s easier to remember just one password, then use that everywhere than to remember hundreds of unique passwords, but you don’t need to remember your passwords anymore; get yourself a password manager. Lastpass and 1Password both have free versions you can use. Or, use the built in password managers from Google or Apple.
Wondering if your email account has been compromised? Head over to www.haveibeenpwned.com and type in some of your email addresses - it’ll tell you just how many data breaches you’ve been victim of.
If attackers have your email address or phone number, chances are they’ll be spamming you with calls, texts and emails trying to get you to do something you don’t want to do - give them data, click on a link, buy them a gift card.
If it was a company email address that was breached, attackers will use you as a gateway into the company systems. If they can get you to click on the malicious link they’ve sent you in a phishing email, they could potentially gain a foothold in your company’s IT systems and cause all kinds of havoc - stealing more data, deploying ransomware, or disrupting your operations.
How to protect yourself? You may not be able to stop the email/phone call attempts, but you can make sure you respond safely (i.e. not at all). This is not just about you - you need to make sure all of your employees are aware this might happen and to keep an eye out for it. Everybody should be on high alert. If you know what information the attacker has access to, you can be skeptical of anyone who uses that information in any communication with you.
If attackers gain enough information, particularly financial or insurance information, they can use this to impersonate you to apply for services, credit or to spend your money.
How to protect yourself? It depends on what information you think they might have. If they could have credit or debit card details, it’s a good idea to cancel your cards and get new ones issued. If they could have other financial or identity info, consider getting a CIFAS flag on your financial accounts to reduce fraud risk. Please note this does also add on some additional checks if you yourself want to open up a bank account in the future. It's a flag saying "I am at high risk of fraud so double check to make sure it's me requesting the new account before provisioning it".
In the immediate aftermath of a breach, there will be a lot of uncertainty, a lot of ‘who’s to blame’ (not helpful) and a lot of ‘am I being too dramatic’? The reality is: the quicker you act, the better chance you have of protecting yourself and your company from any damage.
According to the European General Data Protection Regulation (GDPR), a data breach should be reported without undue delay, and no later than 72 hours after becoming aware of the breach, unless the breach is unlikely to result in a risk to the rights and freedoms of individuals. If the breach is likely to result in a high risk to the rights and freedoms of individuals, those individuals must also be notified without undue delay.
Under the GDPR, a personal data breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed. Organizations must notify the supervisory authority without undue delay. If the breach is likely to result in a high risk to the rights and freedoms of individuals, those individuals must also be notified without undue delay.
Under GDPR, a data breach should be reported to the supervisory authority, which in the UK is the Information Commissioner’s Office (ICO). If the breach is likely to result in a high risk to the rights and freedoms of individuals, those individuals must also be notified.
Sign up to our monthly newsletter to receive exclusive research and analyses by our experts, the latest case studies from our clients as well as guides, explainers and more to turn your supply chain risk management programme into a resounding success story.