{"id":5669,"date":"2018-05-31T10:08:39","date_gmt":"2018-05-31T14:08:39","guid":{"rendered":"https:\/\/gtm.com\/business\/?p=5669"},"modified":"2024-08-30T11:12:29","modified_gmt":"2024-08-30T15:12:29","slug":"recover-from-a-cyberattack","status":"publish","type":"post","link":"https:\/\/gtm.com\/business\/recover-from-a-cyberattack\/","title":{"rendered":"How to Recover from a Cyberattack on Your Business"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-5673\" src=\"https:\/\/gtm.com\/business\/wp-content\/uploads\/cyber-3327240_1280-1024x682.jpg\" alt=\"recover from a cyberattack\" width=\"1024\" height=\"682\" srcset=\"https:\/\/gtm.com\/business\/wp-content\/uploads\/cyber-3327240_1280-1024x682.jpg 1024w, https:\/\/gtm.com\/business\/wp-content\/uploads\/cyber-3327240_1280-300x200.jpg 300w, https:\/\/gtm.com\/business\/wp-content\/uploads\/cyber-3327240_1280-1080x720.jpg 1080w, https:\/\/gtm.com\/business\/wp-content\/uploads\/cyber-3327240_1280.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>As technology continues to evolve, more and more organizations are susceptible to becoming a cyberattack victim. Malware, ransomware, email scams, phishing schemes, and\u00a0other threats to company data have become more prevalent in recent years, and cybercrime rates continue to rise every year. While preventing an infiltration is optimal, having a plan to recover from a cyberattack is critical.<\/p>\n<p>According to <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/02\/what-to-do-after-recovering-from-a-cyberattack\" target=\"_blank\" rel=\"noopener noreferrer\">Malwarebytes Labs<\/a>, businesses of all sizes should take these four steps to protect their employee and client information in the event their data is compromised.<\/p>\n<h2>1. Identify and contain the problem<\/h2>\n<p>Knowing the facts and documenting the key components will help communications with staff and customers. Your IT workers should be prepared to keep the issue from worsening.<\/p>\n<h2>2. Inform your customers promptly<\/h2>\n<p>Act quickly and communicate as much information as possible, including steps you&#8217;re taking to prevent future issues. Being proactive can help customer confidence and reduce your losses.<\/p>\n<h2>3. Prevent future breaches<\/h2>\n<p>Ensure you have a team of experts working on the issue. Investing in security technologies and cyber security professionals can reduce the cost of data breach recovery.<\/p>\n<h2>4. Tighten up your legal defense<\/h2>\n<p>You may face a lawsuit in the event of a cyberattack if company and customer data is breached. Make sure your legal counsel has experience with cyber security\u00a0even before an incident occurs, and that they are up to date with the latest developments in cyber crime.<\/p>\n<p>Being proactive in preventing an attack is critical. All staff should be trained in identifying threats and knowing how to proceed. Being prepared and reacting quickly are your best defenses. If your data has been compromised, the IRS has released\u00a0<a href=\"https:\/\/www.irs.gov\/individuals\/form-w2-ssn-data-theft-information-for-businesses-and-payroll-service-providers?utm_campaign=Pay%20Matters&amp;utm_source=hs_email&amp;utm_medium=email&amp;utm_content=49829247&amp;_hsenc=p2ANqtz-8QXk3j5i8AFGIlWH-crPwj9scWsYEwJ5LbcO1ug4oVl2IgnJ0793ZdS413gKN0A6FtVvYlT4wxBYWKgiDVv-cLXBBOuA&amp;_hsmi=49829247\" target=\"_blank\" rel=\"noopener noreferrer\">a reporting process<\/a>\u00a0for employers who discover a data breach.<\/p>\n<p>GTM clients can rest easy knowing their data is secure. Because we firmly believe in protecting our clients and partners and their confidential information, GTM voluntarily undergoes a rigorous examination and assessment process for SOC-1 compliance, an internationally-recognized standard developed by the American Institute of Certified Public Accountants (AICPA) that is recognized as a mark of service quality. Plus <a href=\"https:\/\/gtm.com\/business\/disaster-recovery-plan\/\" rel=\"noopener\">our disaster recovery plan<\/a>\u00a0ensures our payroll operations can continue and clients can still access their data in the event of a power loss or other emergency.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Having a plan to recover from a cyberattack is critical.<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[266],"tags":[150,104,18],"post_folder":[],"class_list":["post-5669","post","type-post","status-publish","format-standard","hentry","category-consulting-services","tag-cybercrime","tag-data-security","tag-employer-policies"],"_links":{"self":[{"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/posts\/5669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/comments?post=5669"}],"version-history":[{"count":4,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/posts\/5669\/revisions"}],"predecessor-version":[{"id":7180,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/posts\/5669\/revisions\/7180"}],"wp:attachment":[{"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/media?parent=5669"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/categories?post=5669"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/tags?post=5669"},{"taxonomy":"post_folder","embeddable":true,"href":"https:\/\/gtm.com\/business\/wp-json\/wp\/v2\/post_folder?post=5669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}