What to do when your infrastructure has been breached

Data breach

Hardly a week goes by without news of some company's infrastructure being breached and data compromised.

In late February this year, the servers belonging to Linux distro Mint were penetrated and a malware-infested ISO was inserted, leading to many users downloading more than just an operating system.

Have a plan

While no one wants to fall victim to such a breach, organisations must take steps to prepare for such an event. If it does happen, what should you do to survive such a security incident?

Although it is almost impossible to create detailed response procedures for every breach scenario that could occur, you can create and agree a framework with generic processes and clear responsibilities, according to David Calder, managing director at ECS Security.

"This is worth doing and will help ensure good governance and momentum while minimising the business impact of any attack," he says. Calder adds that industry standards exist to support the creation of response procedures. "There are sound and proven sources such as NIST and the ISO."

Mark Logsdon, cyber resilience expert at Axelos, the UK government and Capita joint venture, says that the first thing to do when an incident takes place is to activate the incident response plan.

"This plan should consider what's been lost or is not available, the impact it has, how it happened, is it still going on, how do we fix it and how we prevent it happening again. In addition, there are some crucial business decisions," he says. This means who do you talk to first? Customers, press, police, regulators, shareholders?

Also what do you say and when? "There's also the question of what to say to staff, who then may innocently use social media to tell the world about what's being said internally," adds Logsdon.

Calder says that organisations should know their systems inside out. Compromises will often not leave obvious, conclusive signs – the evolution of attacks means that some will not have been seen before, he says.

"The best defence against these is investing time to know your environment better than an attacker could, making it easier to spot anomalous activity," he notes. Firms must also consider how to do this in their infrastructure. "At the very least it will highlight points that will benefit your organisation, such as potential availability issues and potentially unauthorised actions by legitimate users."

Rene Millman
Contributing Writer

Rene Millman is a seasoned technology journalist whose work has appeared in The Guardian, the Financial Times, Computer Weekly, and IT Pro. With over two decades of experience as a reporter and editor, he specializes in making complex topics like cybersecurity, VPNs, and enterprise software accessible and engaging.