Sales and Services 844-558-7200

Contact

For non-technical questions, please complete this form and a representative will reply to you shortly. Our general mailbox is monitored during normal business hours of 8AM-5PM ET, Monday through Friday.


For emergencies call 844.558.7200 and press option #9.

For Support Click Here

1000 Germantown Pike, Suite C4 - Plymouth Meeting, PA 19462

For support, click here. Contact Alura

Blog

5 Steps to Take When Faced with a Cyber Attack

March 16, 2017

In a previous post, we told you about how to protect your small-to-medium business against cyber attacks. But what happens when a cybercriminal manages to infiltrate your organization's network despite the defenses you've put into place?

Our Montgomery County IT security service is here to walk you through the steps that you and your employees should take in the event of a suspected or verified cyber attack: 

  1. Determine the source and type of attack you're dealing with – Once you've confirmed that the cyber attack is real, it's time to call on all of your employees who have the knowledge and skills to locate the source of the attack. You should have them focus on determining whether you're dealing with a virus, malware or some other type of threat. To do so, it may be helpful to look at your company's logs.
  2. Decide what steps need to be taken to manage the threat – After you've identified the threat, the next order of business is to determine how to minimize the damage. This might mean monitoring or blocking the attacker's actions, increasing your firewall protection or even taking the system offline if the threat is severe enough. No matter what you decide to do, it's crucial to act fast to avoid extensive losses for your company.
  3. Break out the backups – Hopefully, your business has recent backups of all of its data that can be used to keep your company running while it is under attack. It may not be necessary to use these backups in every situation, but you should have them ready in case they are needed.
  4. Document the attack – In order to prepare to report the attack to the authorities, you should collect information from the server from the time that the system was affected. You'll also want to compile details about the employees working on the compromised systems as well as records of any communications that may be pertinent to the attack.
  5. Contact law enforcement and any individuals who could be affected – To hold the cybercriminal responsible for his/her actions and prevent other people from being the victims of similar attacks, you should report the incident to the authorities as well as employees and customers who may be reached by the threat. Not only is this a good business practice; it's necessary to avoid legal consequences that may come from failure to report the attack.

When a cybercriminal strikes, it's important to be aware of what NOT to do in addition to knowing the basic steps to follow. For instance, you and your workers should avoid communicating about the breach via the system that has been compromised. This is because doing so may give the attacker knowledge of your plans to thwart his/her efforts, allowing the invader to continue holding your system hostage.

Depend On Alura for Assistance with Preventing & Handling Threats! 

When it comes to preparing for and dealing with the aftermath of cyber attacks, you'll want to have Alura Business Solutions on your team. As the IT security service Montgomery County businesses have trusted since 2005, we have extensive experience safeguarding networks and recovering systems and data that have been compromised.

If you'd like to learn more about our IT security service in Montgomery County, give us a call at 844-558-7200 or visit us on the web. We look forward to assisting your business in reaching its goals while helping you resolve any issues that may pop up along the way!

Tags: Early Detection, Malware, Internet Security, Threat Protection, Protection, Security,

Our Partners

  • AYC Media
  • AVG
  • Cisco
  • Dell
  • VMware Partner
  • Intronis
  • Mimecast
  • StorageCraft
  • Sonicwall
  • Aerohive
  • NetApp
  • GFI
  • Microsoft Partner
  • Microsoft SBS
  • Munilogic
  • WorldDox

Recognition

  • BBB
  • GPCC
  • Philly100
  • SmartCEO Future 50
  • Inc 5000
  • LGBT Top Company
  • CRN MSP 500
  • LVB Fastest Growing Company
  • PA Costars
  • CRN NExt Gen 250
  • USAAB
  • PBJ 40 Under 40
  • PBJ Top IT Pro 2015