There is a saying that is often attributed to a Chinese proverb (though its origins are actually unknown) that the best time to plant a tree is 20 years ago, and the second-best time is today.
Similarly, the best time to respond to a ransomware attack was yesterday, but the second-best time to start responding is today.
Study[1] after study[2] after study[3] after study[4] over the past year has confirmed that having a plan in place in the event of a data breach and ransomware attack can save you and your company millions. Every employer has a fire evacuation plan and drills they run, and this is no different.
In the unfortunate event of a data breach, you are going to want to know a lot of critical information very quickly. The good news is that you can gather a lot of that information today:
- Who in your organization is responsible for each aspect of the response, and do you have their personal contact information?
- Do you have cyberinsurance coverage and, if so, what is the contact information?
- Who is your data breach response attorney, and what is their contact information?
- What is the phone number for your local FBI office? In Arizona, it’s (623) 466-1999.
- What data do you have, and where is it stored?
- Where is your backup, and when is the last time you checked to make sure it worked?
- Are you in a specially-regulated industry that imposes a short deadline for providing notice of data breach incidents and ransomware payments, such as health care, health tracking, banking/finance, student data processing, or defense contracting?
Having these answers on hand will save you precious time and money if your system is compromised. Knowing what data you have and where it is stored will allow you to quickly assess what might be compromised and how to best limit further access to your system.
This will also free you up to think more critically about whether to pay the ransom, as there are some questions you likely will not be able to answer until you face a ransom demand:
- How real is this demand (have the threat actors really exfiltrated your data, or did they gain just enough access to splash a scary demand on your screen)?
- Is the attacker a sanctioned entity?
- Will your policy cover the payment?
- What is the cost of interruption vs. the cost of payment?
- How likely are you to be a repeat target?
- Does the FBI have a decryptor key already?
Finally, keep a running list of all your agreements (vendor/supplier contracts, client contracts, etc.) that require notification in the event of a breach. Some of your agreements may require notification within 24-48 hours and may require notification of any data breach incident, not just an incident involving that party’s data.
For more information about developing a data breach response plan and continued awareness concerning cybersecurity threats, contact Patrick Emerson McCormick at pmccormick@lewisroca.com or another member of Lewis Roca’s Data Protection and Cybersecurity Team.
[1] https://www.verizon.com/business/resources/reports/dbir/
[2] https://www.ibm.com/reports/data-breach
[3] https://www.blackberry.com/us/en/forms/enterprise/report-bb-2022-threat-report-aem
[4] https://www.accenture.com/_acnmedia/PDF-165/Accenture-State-Of-Cybersecurity-2021.pdf
- Associate
Patrick is an associate in the firm's Litigation, Data Privacy and Cybersecurity, and eDiscovery Practice Groups. Patrick is a Certified Information Privacy Professional (CIPP/US) and assists clients on all aspects of data privacy and cybersecurity compliance and response, from ...
About This Blog
Lewis Roca is immersed in your industry and invested in your success. We share insights and trends that can affect your business.
Search
Topics
Archives
- September 2024
- August 2024
- May 2024
- March 2024
- February 2024
- September 2023
- April 2023
- March 2023
- February 2023
- December 2022
- November 2022
- October 2022
- September 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- February 2021
- January 2021
- December 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- October 2019
- September 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- November 2018
- April 2018
- February 2018
- January 2018
- December 2017
- November 2017
- September 2017
- August 2017
- June 2017
- May 2017
- April 2017
- March 2017
- November 2016
- October 2016
- September 2016
- August 2016
- April 2016
- January 2016
Authors
- Alfredo T. Alonso
- Amy E. Altshuler
- Edwin A. Barkel
- Trevor G. Bartel
- Nick Bauman
- G. Warren Bleeker
- Brooks Brennan
- Ogonna M. Brown
- Chad S. Caby
- John Carson
- Rob Charles
- Joshua T. Chu
- Howard E. Cole
- Katherine Costella
- Thomas J. Daly
- Pat Derdenger
- Thomas J. Dougherty
- Susan M. Freeman
- Yalda Godusi Arellano
- John C. Gray, CIPP/US
- Art Hasan
- Frances J. Haynes
- Dietrich C. Hoefner
- Jennifer K. Hostetler
- David A. Jackson
- Andrew Jacobsohn
- Kyle W. Kellar
- Kris J. Kostolansky
- Gregory S. Lampert
- Shaun P. Lee
- Glenn J. Light
- Laura A. Lo Bianco
- Karen Jurichko Lowell
- James M. Lyons
- H. William Mahaffey
- Constantine Marantidis
- A.J. Martinez
- Patrick Emerson McCormick, CIPP/US
- Michael J. McCue
- Lindsay L. McKae
- Linda M. Mitchell
- Gary J. Nelson
- Rachel A. Nicholas
- Laura Pasqualone
- Michael D. Plachy
- David A. Plumley
- Kurt S. Prange
- Katie M. (Derrig) Rios
- Robert F. Roos
- Karl F. Rutledge
- Daniel A. Salgado
- Mary Ellen Simonson
- Susan Strebel Sperber
- Jan A. Steinhour
- Ryan M. Swank
- Dustin R. Szakalski
- Chris A. Underwood
- Jennifer A. Van Kirk
- Hilary D. Wells
- Drew Wilson, CIPP/US
- Karen L. Witt
- Meng Zhong
Recent Posts
- The Importance of Retaining a Grandfathered Gaming Location in Nevada
- Welcome our 2024 Michael D. Nosler Scholarship Intern
- Going Viral: Navigating Promotional Sweepstakes Legality in the Social Media Era
- Arizona Voters Modify Creditors' Remedies with Passage of Proposition 209
- Nevada Gaming Control Board Issues Gaming Technology Approval Guidelines
- Amendments to Nevada Gaming Regulation 5
- Nevada Gaming Control Board Workshop on Public Regulation
- New Wave of Arizona Privacy Litigation Regarding Tracking Pixels
- Legal Issues, Problems, and Unanswered Questions Regarding a State’s Ability and Potential Departure from the Depository Institution Deregulation and Monetary Control Act of 1980 (“DIDMCA”)
- New Trademark Scam