Preparing for a cyberattack

May 13, 2025
15 min read
cracked-lock-with-binary-code-cybersecurity-threat

It's important to prepare for a cyberattack before it happens. Cybercriminals won't wait until you've taken precautions before targeting you.

A few weeks ago, we presented a 2020 cybersecurity review and predictions for 2021. Did this article give you a heads-up? Now you want to optimize your game plan so you can face a cyberattack without (too much) worry? Then this article is for you: discover how to prepare for a cyberattack.

First, we'll look at what you can do in your IT and business environment to limit the damage in the event of an attack. Then, we'll look at what actions to take if you're the victim of an attack.

Before the attack

1. Make regular backups

Define essential data and files and perform regular backups (ideally every night). On an external hard drive or a network attached storage server. It will be necessary to keep it outside your workplace (because in the event of a fire or burglary, for example, it will be essential to have backed up your data elsewhere). We also suggest making backups to the cloud to have an external copy accessible anywhere and at any time.

Furthermore, it's also important to archive data you don't use on a daily basis. This way, it won't clutter up your work tools, but it also allows you to be sure you've backed up everything. This gives you greater peace of mind.

Finally, consider encrypting your most sensitive data and computers.

2. Prepare a diagram of your network

Called a “Network Diagram,” a network diagram is a visual map of your IT ecosystem: the systems, vendors, and partners, as well as the connections between them. It shows how your data flows through your IT ecosystem by showing the location, IP addresses, names, and functions of devices (routers, computers, servers, hubs, firewalls, etc.).

It's up to you to decide how much precision you need on your diagram.

To create your own network diagram, Lucid Charts ' article will give you all the details as well as access to their diagramming tool.

network-diagram

Example of a network diagram

3. Prepare a data flow diagram

Called a Data Flow Diagram (DFD), a data flow diagram is a visual map representing the flow of data within your information system. It provides an overview of your system and how data is processed: what data enters, what data leaves, where it comes from, and where it is stored.

Again, Lucid Charts ' article on data flow diagrams will give you all the details on how to create one as well as access to their diagramming tool.

4. Prepare an action plan in case of attack

Prepare a detailed action plan and keep it up to date.

To do this, you'll need to imagine the possible attack scenarios your company could be subjected to. These scenarios vary from one industry to another. A banking company will be targeted for a different reason than a marketing company, for example. Once the scenarios have been identified, you'll need to rank them by severity to plan appropriate responses.

Prepare a list of people to contact immediately in case of a problem: legal advisor, insurance, customers, suppliers, etc.

Choose an insurance policy that covers you in the event of a cyberattack. Also, make sure it covers you for the various scenarios you've identified. Also, at each renewal, make sure the clauses still adequately protect you to avoid unpleasant surprises.

Next, define who will be responsible for handling the situation in the event of an attack. This way, you'll ensure that someone knows what to do and who to contact immediately.

5. Have dedicated staff

Either by training or recruiting internal staff so that you have someone specialized in handling attacks.
Or by outsourcing your IT service. This way, you ensure that it is managed by experts whose core business is the security and proper functioning of your IT tools. Likewise, you ensure that even outside of your working hours, your IT environment is secure and monitored.

Trust Nexxo 's experts to outsource your IT service! Contact us at 514-548-3466 or via our contact form .

organised-hackers-room-with-computers-stealing-online-informations

After the attack

1. Identify the attack

The first step in the event of a cyberattack is, of course, to properly identify it.
Where did it come from? Was it due to an internal error? Or to malicious software? What data was targeted? Which users were affected?

2. Follow your action plan

This step speaks for itself. You've put a procedure in place to respond effectively in the event of an attack, now's the time to put it into action!

3. Quickly report the damage

In addition to helping you know what needs to be fixed, this will also allow you to improve your security process to prevent future attacks and update your action plan.

4. Isolate parts of the network that have been compromised

Once you've assessed the damage, you can isolate the compromised parts of your network. This will help you limit the damage and allow the rest of your IT ecosystem to continue operating (almost) normally.

5. If necessary, contact the responsible authorities.

Have the people you plan to contact in your action plan done everything possible? Then the next step will be to contact the responsible authorities: police, Canadian Centre for Cyber ​​Security.

6. Carry out security monitoring

To check that everything is back to normal and that no new problems have arisen.

In summary

It's important to prepare for a cyberattack before it even happens. Cybercriminals won't wait until you've taken precautions to launch an attack and target your data.

You now have all the tools in your hands to secure your IT environment and thus limit the damage if (or when, because it seems that online criminal activity is not going to stop anytime soon) you are targeted by cybercriminals.

About Nexxo

Nexxo Solutions informatique is a company specializing in providing IT and technology services to Quebec businesses. Its mission is to offer Quebec companies IT services tailored to their needs. Acting as an external IT department, it handles all of a company's IT tasks, allowing it to focus on its business activities. It achieves this by collaborating closely with its clients and putting their interests at the center of its concerns.

Stay Ahead with Expert Insights

Subscribe to our newsletter for the latest tips and updates in the tech industry.