• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Kane Russell Colman Logan PC

  • Attorneys
  • Practices
    • Bankruptcy, Insolvency & Creditors’ Rights
      • Distressed Assets
    • Business & Corporate
      • Corporate Finance
      • Cyber Security
      • Mergers and Acquisitions
      • SEC Reporting
    • Employment
      • Immigration
      • OSHA Defense
    • Financial Services
    • Health Care & Medical Peer Review
    • Intellectual Property
    • Litigation
      • Complex Commercial Litigation
      • Insurance
      • Investment Fraud
      • Large Loss Subrogation
      • Nonsubscriber Defense
      • OSHA Defense
      • Personal Injury
      • Products Liability
      • Professional Liability
    • Real Estate
      • Real Estate Financing
    • Tax
  • Industries
    • China
    • Construction
    • Energy, Oil and Gas
    • Environmental
    • Esports
    • Manufacturing
    • Railroad
    • Retail, Restaurant & Hospitality
    • Transportation
  • Insights
    • Articles
    • Blogs
    • Events
    • News
    • Webinars
    • Subscribe
  • About
    • 25 Years in the Making
    • Alliances
    • Careers
    • Diversity and Inclusion
    • Administrators
  • Contact
  • Nav Social Menu

    • Email
    • Facebook
    • LinkedIn
    • Twitter

Toolkit for Managing the Eventual Hack: Part 4 of 4

Home  //  Insights   //   Articles  //  Cyber Security  //  Toolkit for Managing the Eventual Hack: Part 4 of 4

October 28, 2014 Amy Taylor Cyber Security

You have dissected your existing business insurance.  You have “armored up” with cyber insurance to insulate and immunize the business risk.  You have put internal controls in place to minimize risk.  Even with all these safeguards, any business with computers is at risk of bring hacked.  So what more can you and should you do?  You need a toolkit for managing an actual breach event.  Any prudent business must deploy these simple steps:

  1. Analyze your data and business assets.  What are the crown jewels or treasured assets of the business you need to protect?
  2. Educate yourself early on and often as to how you will manage a breach.  Don’t rely solely on IT to do this for you since they do not have the full business context.  Are there regulatory requirements that mandate you to report a breach incident?  If so, to whom?  Will you share breach information with those outside the company?  If so, how broadly and to what degree?
  3. Develop internal policies and communicate them to every person in the organization.  These may be BYOD (bring your own device) policies, policies on email spam, policies on removal of business data, work-from-home or offsite policies, social media policies or any other policy necessary to minimize risk from your employees becoming unwitting attackers of your business data.
  4. Assemble an internal team who will be notified and who will assist to  manage the crisis.  Who needs to be on this team?  Have you considered those needed to stop the breach as well as those needed to address the damage?  What about those needed to preserve evidence?
  5. Draft an outside team of trusted advisors.  These should include local law enforcement officials, experts on preservation of the platform that was breached for investigation, public relations and communications experts and attorneys.
  6. Develop a protocol and action plan for notifications and next steps.
  7. Practice breach scenarios.  It is much easier to manage a breach if you put your team through several trial runs.  Have your internal team think through the protocol and look for vulnerabilities.  Test the protocol with your outside team of advisers and then fortify the action plan with what you learn.  Make the trial runs a part of your culture on a regular basis.

With prudence, wisdom and constant vigilance, most businesses can tremendously diminish the risk of a cyber-invasion and with a strong business/insurance partnership, most other cyber risks can be managed wisely.

Kane Russell Coleman Logan is a full-service law firm with offices in Dallas and Houston. Formed in 1992, the Firm provides professional services for clients ranging from Fortune 500 companies to medium-sized public and private companies to entrepreneurs. KRCL handles transactional, litigation and bankruptcy matters in Texas and throughout the country.

Primary Sidebar

Search

Insights

  • Articles
  • News
  • Events
  • Press Releases
  • Webinars
  • Subscribe

Topics

Blog Network

Framing Issues
Trains , Trucks & The Law
Energy Law Today
Law of Banking
Law in the Workplace
Retail Restaurant & Hospitality Law
Insolvency Insights

Footer

Who We Are

  • About
  • Attorneys
  • Administrators
  • Careers

What We Do

  • Practices
  • Industries
  • Insights
  • News

Dallas Office

Bank of America Plaza
901 Main Street
Suite 5200
Dallas, Texas 75202

Phone: 214-777-4200
Fax: 214-777-4299

Houston Office

Galleria Tower II
5051 Westheimer Road
10th Floor
Houston, Texas 77056

Phone: 713-425-7400
Fax: 713-425-7700

Pay Your Invoice

Pay Your Retainer

Kane Russell Colman Logan PC© 2021 All Rights Reserved Log in
  • Attorneys
  • Practices
  • Industries
  • Insights
  • About
  • Contact
Made by Content Pilot
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.AcceptRead more