May 29th, 2024
Contributors: Anagha Anilkumar, Filip Dimitrov, Anup Narayanan
Cyber attacks have become an everyday occurrence. Businesses of all sizes are feeling the pressure of balancing tight budgets while investing in the necessary cyber attack esponse measures to protect against threats.
Perhaps the biggest return-on-investment (ROI) is equipping employees with the necessary skills and knowledge to detect and respond to security incidents. After all, they will be the ones who encounter suspicious activities firsthand and can act as the first line of defense.
This article will explore three practical behaviors every employee should learn to strengthen their role in the organization’s cyber security efforts.
The first cyber security incident response step is containment. Once a security breach is detected, employees must know how to limit its impact by isolating the affected systems and networks. By containing the threat quickly, organizations can minimize the damage, protect unaffected systems, and buy time to investigate and respond appropriately.
Some critical first steps employees may have to take when responding to an incident include:
Regardless of the security training employees receive, they can’t respond to an incident by themselves. Organizations must have well established protocols for escalating incidents to the appropriate parties, which may include an internal IT security team, law enforcement, or a third-party cyber attack response provider.
Internal Reporting:
Involving Additional Resources:
Engaging External Parties:
The best cyber security behavior for an employee after reporting the incident is not to do any investigation on their own and leave the matter to experts. Employees should be trained to detect and report an incident, but anything beyond that is out of scope for them.
Digital data is very volatile, and even slight tampering can compromise its integrity, making it difficult or impossible for forensic experts to accurately analyze the incident. This can hinder the identification of the root cause, obscure the actions of the perpetrators, and ultimately undermine legal proceedings.
Employees should understand the importance of evidence preservation and know how to properly collect and document evidence if instructed to do so by the IT or security team. Here are some guidelines:
A well-documented chain of custody is also necessary to maintain the integrity and admissibility of the evidence. A chain of custody is established by labeling and securing evidence, maintaining a detailed log of every instance of evidence access, and restricting access to the evidence to only those individuals who are directly involved in the investigation.
Employees play a critical role in incident response. Each organization needs a well-defined incident response plan that employees can follow during security incidents. The cyber attack response plan should outline the steps and behaviors covered in this article, from how to contain the breach and prevent further damage, and instructions on escalating the issue to the appropriate parties.
Book a Demo
Get a guided demo of our courses, anti-phishing training, behavior assessments and managed services.