top of page

Are you a victim of cyber-attack? Here’s what you should do

Cyber-attacks can happen to any business, large or small. It’s important to have the right measures in place to protect yourself and your business from any malicious activity. This blog post will provide an overview of what to do if you find yourself the victim of a cyber-attack.



Unplug the system from the network

If you find yourself the victim of a cyber-attack, the first step should be to unplug the system from the network, so it doesn’t spread. This is especially important if you're a sole trader, as you don’t want the attack to spread to your customers and other third parties.


Go offline to avoid affecting backups

Going offline is important to avoid the risk of the cyber-attack affecting any backups. Backups are critical for any business, as they allow you to recover any lost data and return to normal operations more quickly. By taking the system offline, the risk of any backups being affected by the attack is reduced.


It’s also important to note that if the system is still connected to the network, the cyber-attack can spread and affect other systems as well. This is especially true in the case of a ransomware attack, as the malicious code can spread to other connected systems on the network. Going offline is the best way to ensure that the attack is contained and does not cause any more damage.



Ring your MSP for help.

If you’re a solo business, contacting your Managed Service Provider for assistance can be helpful. They can help you figure out the best ways to respond to any cybersecurity incidents and IT issues so that you can resolve them quickly and efficiently. Don’t have an MSP to contact? Your local Cyber Resilience Centre can refer you to a reputable company.



Check your business continuity plan.

It’s important that everyone is aware of the business continuity plan, as this will give them an idea of what to do in case of an attack. This plan should outline the steps that need to be taken following a cyber-attack, such as shutting down or disconnecting affected systems, informing relevant authorities, and restoring data backups.


Knowing this plan ahead of time can help the organisation respond quickly to any cyber security incidents and minimise the damage caused. Additionally, it is important that there are regular reviews and updates to the plan to ensure it is up to date and in line with any changes in the organisation’s technology and infrastructure.


No matter the size of your organisation, it's important to have a company policy in place, so everyone knows what to do in case of an attack. It’s also crucial to remember not to make the situation worse. Time is of the essence in these cases, so it’s important to act quickly and take the necessary steps to protect your data.



Report it

When dealing with cyber-attacks, it can be helpful to take a rational approach. The first port of call should be to report the incident to Action Fraud, who will be able to provide advice and guidance on how to proceed. It’s also important to remember not to pay the ransom, as this is often ineffective and can only make the situation worse.


We don't recommend paying cyber attackers the ransom they are demanding. Not only does paying the ransom not guarantee that you will get your data back, but some hackers may even increase their demands after receiving payment. Most businesses don't get anything back when they pay the BitCoin ransom. Moreover, paying the ransom also encourages the hacker to continue committing similar crimes in the future. The best course of action is to contact an MSP provider who can help you restore your data from backups, or help you mitigate the attack and minimise the damage.


Get support

At the same time, it can be beneficial to link up with trusted partners through the Cyber Resilience Centre website. We provide a range of resources and advice on cyber security, from software and hardware recommendations to safe online practices. This can be invaluable for businesses looking to protect their data and systems from cyber threats.


Additionally, we provide Cyber Essentials for businesses, which helps establish trust with customers and other organisations. This helps to demonstrate a commitment to cyber security and can potentially give businesses a competitive edge.


Ultimately, prevention is always better than cure when it comes to cyber-attacks. Taking proactive steps to secure your data and systems is essential to protect your business from malicious activity. This includes having up-to-date software, strong passwords, and antivirus and malware protection.


Educating yourself and your staff on cyber security can help ensure that everyone is aware of the risks and what steps to take to protect the business from attack. Taking the steps to protect your business from cyber-attacks is essential to ensure your data and systems remain secure.



However, if you find yourself the victim of a cyber-attack, follow the steps mentioned in this blog post to protect yourself. Contact us today to become more cyber secure.

Comments


The contents of this website are provided for general information only and are not intended to replace specific professional advice relevant to your situation. The intention of The Cyber Resilience Centre for the West Midlands is to encourage cyber resilience by raising issues and disseminating information on the experiences and initiatives of others.  Articles on the website cannot by their nature be comprehensive and may not reflect most recent legislation, practice, or application to your circumstances. The Cyber Resilience Centre for the West Midlands provides affordable services and Trusted Partners if you need specific support. For specific questions please contact us.

 

The Cyber Resilience Centre for the West Midlands does not accept any responsibility for any loss which may arise from reliance on information or materials published on this document. The Cyber Resilience Centre for the West Midlands is not responsible for the content of external internet sites that link to this site or which are linked from it.

bottom of page