QUESTION
We were just hit with a data breach and were completely unprepared for it. Hackers took personal information from our corporate server. We believe that customer information was stolen. The hacker also went after our website, meaning information there may be exposed.
Our Business Continuity policy is all of two pages. We put it together by pasting it from a few Google searches. You may think we are a small mortgage lender, but we have branches in eight states and originate a large volume of mortgage loans.
We have already alerted law enforcement. We are working on a quick plan to notify investors and customers. But we have no process to follow for this data breach. We're working without a guide.
All of us in management know you have written a lot about issues like ours. Please help as soon as possible.
What should we do immediately if we are hacked?
ANSWER
NOTE: This article provides links to subject articles, presentations, and a complimentary Data Breach: Quick Reference Checklist.
As many of you know, I am like a Mother Hen regarding our clients, always looking to protect them. And through these weekly newsletters, I try to ensure our readers are made aware of regulatory compliance challenges. However, some readers ignore my advice, one of which is the importance of having a policy for Business Continuity.
Our Business Continuity plan is comprehensive. We believe it meets regulatory scrutiny; however, I don't care if you want ours or another firm's policy. Assuming the policy is reliable, get it and implement it! If you are not operating with a plan, your company is unprepared for a data breach. Also consider our mini-audit, BCP Tune-up, which provides a review of your Business Continuity plan and procedures.
For information about our Business Continuity Plan, click HERE.
For information about our BCP Tune-up, click HERE.
Here are just some articles I have published on Business Continuity:
·
Disaster
Recovery and Business Continuity
·
Cybersecurity
Rule – Proposed Updates
·
Prohibited
Acts and Practices
·
Large Bank
Cybersecurity Challenges
·
UDAAP
Violations caused by Insufficient Data Protection
As Falstaff said, "Better three hours too soon than a minute too late."
Don't delay. Procrastinate at your peril!
Let's turn to the situation you find yourself in, to wit, a data breach and no plan for Business Continuity, which should include a Disaster Recovery component.
If your company experiences a data breach, you should notify law enforcement, other affected businesses, and individuals. Since I do not know your company's size, complexity, or risk profile, my remarks are necessarily generic.
However, I will provide a bulleted outline so you can act promptly.
Request the complimentary Data Breach: Quick Reference Checklist.
Evidence
·
Do not destroy evidence.
·
Don't destroy any forensic evidence in the course of your
investigation and remediation.
· Document your investigation.
Immediate
Response
·
Secure physical areas potentially related to the breach. Lock them
and change access codes.
·
Mobilize your breach response team right away to prevent additional
data loss. The exact steps to take depend on the nature of the breach and the
structure of your business.
·
Assemble a team of experts to conduct a comprehensive breach
response. Depending on the size and complexity of your company, they may
include forensics, legal, information security, information technology,
operations, human resources, communications, investor relations, and
management.
·
Identify a data forensics team. Consider hiring independent
forensic investigators to help you determine the source and scope of the
breach. They will capture forensic images of affected systems, collect and
analyze evidence, and outline remediation steps.
· Consult with legal counsel. You may consider hiring counsel with privacy and data security expertise. They can advise you on federal and state laws that a breach may implicate.
Stop
Data Loss
·
Take all affected equipment offline immediately — but don't turn
any machines off until the forensic experts arrive.
·
Closely monitor all entry and exit points, especially those
involved in the breach.
·
If possible, put clean machines online in place of affected ones.
· Update credentials and passwords of authorized users. If a hacker stole credentials, your system will remain vulnerable until you change those credentials, even if you've removed the hacker's tools.
Remove
Web Vulnerability
·
Your website – If the data breach involved personal information
improperly posted on your website, immediately remove it. Be aware that
internet search engines store, or "cache," information for some time.
You can contact the search engines to ensure that they don't archive personal
information posted in error.
· Other websites – Search for your company's exposed data to ensure no other websites have saved a copy. If you find any, contact those sites and ask them to remove it. This applies to websites operated by your company's loan officers and agents.
Interviews
·
People who discovered the breach should be interviewed.
· Talk with anyone else who may know about it.
· If you have a customer service center, ensure the staff knows where to forward information that may aid your investigation of the breach.
Service
Providers
·
If service providers were involved, examine what personal
information they can access and decide if you need to change their access
privileges.
·
Ensure your service providers take the necessary steps to ensure another
breach does not occur.
· If your service providers say they have remedied vulnerabilities, verify that they fixed things.