Close your eyes and imagine this horrifying scenario: It’s 3 am and your worst nightmare as an MSP or IT services provider has become reality: You’ve been hacked and are locked out of all your systems under threat of having to pay a ransom. If you deal with customer data, particularly data that contains personally identifiable information, you may be wondering how you would respond after an attack by a threat actor.
In this important interview with Blair Dawson, Partner at McDonald Hopkins, you’ll not only hear how to respond to a “reportable incident,” but also how to protect your business and your customers. Listen to learn:
- Why you need to understand what the term “Reportable Incident” means ASAP
- Who you should contact FIRST once a threat actor has done their worst
- Why you should NEVER contact the media to “get ahead of the story”
- What a Carrier is and why you need to form a relationship with one right away
- How to design an Incident Response Plan that will help prepare both you and your customers to survive an attack
- How to communicate with your customers and staff to ensure you protect yourself legally while being transparent
- The time and place to use “hot words” like breach, hack, ransom, or intrusion
- Tips for selecting the right legal counsel and how they can help you before an incident ever occurs
If you manage customer data, this is an interview you don’t want to miss!
Protecting your business from cybersecurity threats is an ongoing challenge. If you’re looking for ways to ensure your employees are following best practices in this area, check out this interview with Clint Bodungen, Co-Founder / CEO & Chairman at ThreatGen. He shares how gamification makes security training fun and increases compliance with smart business practices.