Page 19 - GS220302
P. 19

Views



        What’s the proper response to a cyberattack?                • Test your backup procedures and other response
                                                                      protocols.
        If you believe you have detected signs of an attack, act    • Create a response plan in the event of a cyberattack
        quickly using the following steps to mitigate the damage.     incident.
            • Immediately isolate affected devices by disconnect-   • Maintain alternative systems or manual controls
              ing them from your network.                             that can be used if critical systems are taken offline.
            • Make sure that your backups are offline and secure,   • Train your IT staff to look for unusual network ac-
              and scan them for viruses.                              tivity, user behavior, and data artifacts.
            • Review all access logs and other relevant data for    • Use email filters and employee training programs to
              additional indicators.                                  lessen the efficacy of phishing attacks.
        It may also be appropriate to report incidents to CISA or   Businesses are used to dealing with hackers, phishers and
        the FBI.                                                fraudsters, but few are tested by advanced, state-spon-
                                                                sored attackers bent on destruction rather than personal
        What’s the best way to prepare for a cyberattack?       gain. Hopefully, the world will return to peaceful footing
                                                                before the war in Ukraine spills further into cyberspace,
        The better prepared you are for an attack, the less harm   but everyone with an online presence to protect should
        you will experience, and the quicker you can get back to   be thinking about how they can keep their users and data
        normal. Here are actions to take:                       safe.
            • Require multi-factor authentication for system ac-  Suresh Dakshina is president and co-founder of Chargeback Gurus,
              cess.                                             https://www.chargebackgurus.com/en/. He holds a master’s degree
            • Require strong passwords.                         from the University of Southern California and has consulted Fortune
            • Make sure your antivirus software is patched and   5000 companies for over a decade on chargeback and fraud minimi-
              updated.                                          zation. Suresh also works closely with card networks such as Visa and
            • Disable all network ports and protocols that are not   American Express on chargeback process optimization and compelling
              essential to your operations.                     evidence policies.
   14   15   16   17   18   19   20   21   22   23   24