I have written
many times about the need for Incident Response (IR), Disaster Recovery (DR),
and Business Continuity BC) Plans before.
A lot of confusion still exists among all three of these, so here is a
brief differentiator amongst all three of them:
IR: This is a plan that has been created to immediately
put out the fires from a threat variant that has just been discovered and is
causing harm to the business.
DR: This is a plan to restore the mission critical
operations after a business has been with the threat variant.
BC: This is a plan that details how the business
will come back to a sense of normalcy over the long term, after it has been impacted
by a security breach.
Many CISOs
did not fully realize the importance of these plans until the COVID-19 pandemic
hit. But of course, back then nobody
ever predicted that we would have a 99% remote workforce. So, you might be wondering why am I mentioning
all of this? Well, think about it. The common theme here is not only about containing
a security breach but dealing with the aftereffects of it.
And one of
the greatest impacts of all of this will be felt by your customer. Unless they are extremely loyal to you, the
chances are that they will stop doing business with you and go to your competitor. To a business owner, this of course does not
seem fair, but to the customer their valuable PII datasets have been stolen, and
of course, they will go somewhere else where they feel that it will be
protected better.
To this
extent, the only thing businesses do other than notifying them about the
security breach is to offer free credit monitoring for a period of up to one
year. Whenever I wrote about this, I always
wondered, can’t more be done? Well, this
morning, I came across an article that addresses this very issue. Here are some of their thoughts:
1)
Go
beyond the norm:
By
this, I mean that a business should do more than simply do Penetration Testing,
Vulnerability Scanning, and Threat Hunting.
While these are great exercises to do, another vehicle that should be
explored is the use of Bug Bounty programs.
With this, you are holding a contest and inviting people to find the gaps
and vulnerabilities in your applications, whether they are hardware or software
based. Whoever finds them and offers the
best solution for remediation will then be awarded a cash prize. But there is one caveat here: You must be careful of who invites. For instance, some of the worst of the breed
can apply, especially the Black Hat hackers.
This kind of program can prove to be beneficial, as it takes out the biasness
in finding those gaps and weaknesses.
2)
Quick
reporting:
If
a business has been impacted by a security breach, it is their fiduciary
responsibility to alert not only their customers but other relevant key
stakeholders as well. But this must be
done quickly, like within hours, not days or weeks. But the problem here is that many businesses now
resort to social media to let people know what has happened. But given this era of disinformation, it is
hard to know what is real and not. Another
option would be to place immediate phone calls and text messages, but once again,
with Robocalls and Phishing based SMS messages, once again it is hard to discern
reality. In this regard, the only best
option would be to send a letter out via snail mail. Or,
the business could hire a PR team and let them professionally handle
notifying the customers and key stakeholders.
3)
Offer
more tools:
The
business should also offer something more, like giving a free license to a Password
Manager. But of course, much more must
be done here, for example, the IT Security team will need to train the customers
in how to effectively use it to secure their passwords. But to me, this sends a powerful message that
despite what happened, you are trying to make amends with them. The author of the article even mentioned giving
a small financial compensation, such as $200.00 or so. But to me, this serves no purpose
whatsoever. First, this amount is paltry
compared to what the real damage will be if their PII datasets have indeed been
heisted, and second, paying off people can in the end seem to be pretty
offensive.
My
Thoughts on This:
It has been
cited that security breaches have spiked up as much as 78% since 2023 (SOURCE: We
Can Do Better Than Free Credit Monitoring After a Breach). Therefore, doing more to help the customer
after the fact is going to be of paramount importance. As the old proverb goes: “It can take months
to get a new customer, but only seconds to lose one”.
Probably the
best way to avoid this scenario is to make sure not only that you and your IT
Security team have those plans in place (as reviewed in the beginning), but that
they rehearsed on a regular schedule, and having them updated with the lessons
learned from each practice run.