Recovering from a cyberattack
During the last couple of years, we have seen a lot of news articles about companies that have been hit by a cyberattack. Most of the time, these attacks are intended to cripple or extort an organization. Some examples of cyberattacks in the last couple of years are as follows:
- Attacks on national institutes using a DDoS attack, with the purpose of bringing down websites
- Ransomware attacks targeting hospitals to make sure that they can’t treat patients anymore
It’s nearly impossible to create an IT environment that cannot be compromised. So, let’s assume the worst. What options do companies have to recover from a cybersecurity attack? The good news is that there are standards and protocols that help companies to respond in the correct manner after a cyberattack. Some examples are as follows:
- Microsoft has incident response playbooks for phishing, password spraying, app consent grantx, and compromised and...