• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity • ITES • Retail/Manufacturing  /  What not to do if your business is the victim of a cyber attack
What not to do if your business is the victim of a cyber attack
28 February 2018

What not to do if your business is the victim of a cyber attack

Written by Seqrite
Seqrite
Cybersecurity, ITES, Retail/Manufacturing
7
Shares

It is not a situation any network administrator ever wants to be in. Yet, considering the multitude of attacks nowadays, the possibility of being in such a situation is getting more and more likely. The last year has shown us that no company, big or small, is safe from being hit by a cyber attack. Malicious cyber criminals are getting cleverer in their methods; the tactics are getting even more refined and newer variants of malware are getting produced almost every day.

While no one wants to think of this kind of outcome, such a line of thought is not very clever. Cyber security and risk assessment have a lot in common and hence, a network administrator must consider the worst possibility and plan accordingly. In this case, the worst possibility is of being the victim of a cyber attack. Now there are plenty of tips and advice on what to do in such a situation. However, it is also important what not to do. A lot of seemingly harmless things can actually go a long way in making a bad situation irretrievably worse.

Not having or not following an Incident Response Plan

It goes without saying but every organization must have a proper Incident Response Plan in place for the possibility of a cyber attack in the first place. Not having one in place is an immediate red flag but even if there is one, network administrators must ensure that is followed properly without panicking.

A proper incident response plan must define the scope and objectives, assign contacts and responsibilities, emergency activities, the notifications process and incident closure. A proper communication plan must have also been outlined and strictly followed in case of an incident. Ideally, the incident response plan cannot be designed and then left unattended – it must be continuously updated in light of the changing trends in cybersecurity.

The conclusion is simple: follow your organization’s incident response plan to ensure that you take the correct actions during a cybersecurity incident.

Panicking

This point cannot be emphasized enough. The first reaction to a cyber attack at an organization is panic. The IT team may have never encountered such a situation before and the natural reaction is to get scared and panic. But this is the worst possible reaction you can have to a cyber attack. In fact, that is exactly that the perpetrators of the attack – the cyber criminals – want. Panicking leads to irrational decisions which are rash, emotional and illogical. These can make things worse and allow cyber criminals to do exactly what they want, i.e. ask for more ransomware, access more devices, etc.

Trying to keep the attack a secret

For network administrators, there is a temptation to try and hide the entire event. Network administrators may be susceptible to the belief that their jobs will be at stake if the senior members of an organization find out about the breach. Letting customers know could also negatively affect brand reputation. So the thinking goes: why let anyone know?

Nothing could be more dangerous. Ideally, this should be laid out in the Incident Response Plan but it still bears repetition: efficient communication is a must in the aftermath of a cyber attack. If a communication chain has been established, it must be followed and everyone in the company must be aware of the attack so that they do not mistakenly commit an action which makes things worse.

As for the customers, they must also be informed as soon as possible so that they are aware of how their data may be misused and can take corrective action accordingly. Of course, no company likes being at the receiving end of a cyber attack but network administrators can take heart from the fact that remaining transparent about an unpleasant incident and the company’s handling of it can actually lead to good brand equity in the long run.

Read more: Backup can be your biggest business investment

Not switching to a backup immediately

It is critical that an organization switches to a backup as soon as they detect a breach of security. Any delay in the same could lead to bad consequences with even the backup files being affected. Network administrators must be methodical and careful about it – they must switch to the last safe known backup. This will involve identifying the exact point the transaction happened.

The threat of cyber attacks is real and enterprises need to “unrisk” it before it is too late. The chances of a cyber attack can be greatly diminished by using proper security solutions like Seqrite’s Endpoint Security (EPS) which can protect networks from advanced threats.

As an IT security partner for your business, Seqrite provides comprehensive endpoint security from advanced cyber threats. To know more, visit our website or

seqrite_cta1

 Previous PostAre we ready for Amazon’s automated grocery store?
Next Post  Three key verticals for securing your network
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • Lured and Compromised: Unmasking the Digital Danger of Honey Traps

    June 17, 2025
  • Operation Sindoor – Anatomy of a Digital Siege

    May 23, 2025
  • Digital arrest scam

    Digital Arrest Scam in India: How Cyber Criminals Exploit Fear to Deceive Victims

    February 28, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (21) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (326) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies