Preparing for a cyberattack

It's important to prepare for a cyberattack before it happens. Cybercriminals won't wait until you've taken precautions before targeting you.
A few weeks ago, we presented a 2020 cybersecurity review and predictions for 2021. Did this article give you a heads-up? Now you want to optimize your game plan so you can face a cyberattack without (too much) worry? Then this article is for you: discover how to prepare for a cyberattack.
First, we'll look at what you can do in your IT and business environment to limit the damage in the event of an attack. Then, we'll look at what actions to take if you're the victim of an attack.
Before the attack
1. Make regular backups
Define essential data and files and perform regular backups (ideally every night). On an external hard drive or a network attached storage server. It will be necessary to keep it outside your workplace (because in the event of a fire or burglary, for example, it will be essential to have backed up your data elsewhere). We also suggest making backups to the cloud to have an external copy accessible anywhere and at any time.
Furthermore, it's also important to archive data you don't use on a daily basis. This way, it won't clutter up your work tools, but it also allows you to be sure you've backed up everything. This gives you greater peace of mind.
Finally, consider encrypting your most sensitive data and computers.
2. Prepare a diagram of your network
Called a “Network Diagram,” a network diagram is a visual map of your IT ecosystem: the systems, vendors, and partners, as well as the connections between them. It shows how your data flows through your IT ecosystem by showing the location, IP addresses, names, and functions of devices (routers, computers, servers, hubs, firewalls, etc.).
It's up to you to decide how much precision you need on your diagram.
To create your own network diagram, Lucid Charts ' article will give you all the details as well as access to their diagramming tool.

Example of a network diagram
3. Prepare a data flow diagram
Called a Data Flow Diagram (DFD), a data flow diagram is a visual map representing the flow of data within your information system. It provides an overview of your system and how data is processed: what data enters, what data leaves, where it comes from, and where it is stored.
Again, Lucid Charts ' article on data flow diagrams will give you all the details on how to create one as well as access to their diagramming tool.
4. Prepare an action plan in case of attack
Prepare a detailed action plan and keep it up to date.
To do this, you'll need to imagine the possible attack scenarios your company could be subjected to. These scenarios vary from one industry to another. A banking company will be targeted for a different reason than a marketing company, for example. Once the scenarios have been identified, you'll need to rank them by severity to plan appropriate responses.
Prepare a list of people to contact immediately in case of a problem: legal advisor, insurance, customers, suppliers, etc.
Choose an insurance policy that covers you in the event of a cyberattack. Also, make sure it covers you for the various scenarios you've identified. Also, at each renewal, make sure the clauses still adequately protect you to avoid unpleasant surprises.
Next, define who will be responsible for handling the situation in the event of an attack. This way, you'll ensure that someone knows what to do and who to contact immediately.
5. Have dedicated staff
Either by training or recruiting internal staff so that you have someone specialized in handling attacks.
Or by outsourcing your IT service. This way, you ensure that it is managed by experts whose core business is the security and proper functioning of your IT tools. Likewise, you ensure that even outside of your working hours, your IT environment is secure and monitored.
Trust Nexxo 's experts to outsource your IT service! Contact us at 514-548-3466 or via our contact form .

After the attack
1. Identify the attack
The first step in the event of a cyberattack is, of course, to properly identify it.
Where did it come from? Was it due to an internal error? Or to malicious software? What data was targeted? Which users were affected?
2. Follow your action plan
This step speaks for itself. You've put a procedure in place to respond effectively in the event of an attack, now's the time to put it into action!
3. Quickly report the damage
In addition to helping you know what needs to be fixed, this will also allow you to improve your security process to prevent future attacks and update your action plan.
4. Isolate parts of the network that have been compromised
Once you've assessed the damage, you can isolate the compromised parts of your network. This will help you limit the damage and allow the rest of your IT ecosystem to continue operating (almost) normally.
5. If necessary, contact the responsible authorities.
Have the people you plan to contact in your action plan done everything possible? Then the next step will be to contact the responsible authorities: police, Canadian Centre for Cyber Security.
6. Carry out security monitoring
To check that everything is back to normal and that no new problems have arisen.
In summary
It's important to prepare for a cyberattack before it even happens. Cybercriminals won't wait until you've taken precautions to launch an attack and target your data.
You now have all the tools in your hands to secure your IT environment and thus limit the damage if (or when, because it seems that online criminal activity is not going to stop anytime soon) you are targeted by cybercriminals.
About Nexxo
Nexxo Solutions informatique is a company specializing in providing IT and technology services to Quebec businesses. Its mission is to offer Quebec companies IT services tailored to their needs. Acting as an external IT department, it handles all of a company's IT tasks, allowing it to focus on its business activities. It achieves this by collaborating closely with its clients and putting their interests at the center of its concerns.
Stay Ahead with Expert Insights
Subscribe to our newsletter for the latest tips and updates in the tech industry.