What to do if You've Been Hacked

Hackers, competitors, crime syndicates, and nation states all want your data. It is important to have security safeguards and controls but what do you do if you've been hacked?

Incident Response Plan

Every organization should have a formal Incident Response Policy and an Incident Response Plan. These documents provide a managed approach to responding to a security incident. In addition to other relevant factors, ensure your Incident Response Plan includes:

During the process staff should document decisions and actions taken including:

The Incident Response Plan should include steps to determine if the security breach did, or will in the future, result in harm to the individuals whose information was breached. Situations where there is a presumption that no reasonable risks exist include: the breached data was rendered unusable, unreadable, or indecipherable through a security technology (e.g. encryption) or methodology generally accepted in the information security industry.

Notifications

In some instances notice about the breach is required to be made to various individuals, organizations, and agencies:

Steps Consumers Can Take

If your data breach included consumer information, individuals can take these steps to minimize their future risks:

Additional Resources
Additional information on identity theft, security safeguards, and templates:

All it takes is one security breach to compromise your data. Network security audits help organizations identify, manage, and reduce their risks of a data breach by ensuring the proper security controls are in place.

Security Blog
verified If You Want a "Security Audit"
You Need a Certified Auditor.
Certified Information Systems Auditors

Unlike a security consultant, Altius IT is certified as a Certified Information Systems Auditor to perform a security audit of your environment and issue reports and recommendations to secure your systems. After your audit, Altius IT's Auditor Opinion Letter and Secure Seal let your clients and prospects know you meet security best practice/compliance requirements.

See our In the News page for video clips of our experts on national television as well as over 40 publications featuring Altius IT. In addition to our auditor certifications we hold many security, technical, and project management credentials. More information is available on our About Us page.

Our comprehensive audit service uncovers gaps in your existing defenses so that you can better:

  • Fortify your information systems, applications, and network infrastructure
  • Comply with regulatory requirements
  • Protect your valuable assets