Skip to content
Help Desk
  • Home
  • Information Technologies
    • Desktop Support & Management
    • Disaster Recovery (DR), On-Site & Off-Site Backups
    • Hardware & Software Sales
    • Help Desk, Onsite and Remote Support
    • Local Area Network (LAN) Installation & Support
    • PRO-Active Network Management
    • Server Support & Management
    • VoIP Telephony & Collaboration
    • Wide Area Network (WAN) Installation & Support
    • User Activity Monitoring
    • Managed Endpoint Detection and Response
  • Web Design & Development
    • Content, Messaging & Communication
    • Web Application Development
    • Website Design & Development
    • PRO-Active Website Management
  • Digital Marketing
    • Content, Messaging & Communication
    • PRO-Active Internet Marketing
    • Search Engine Marketing (SEM)
    • Search Engine Optimization (SEO)
    • Social Media Marketing (SMM)
  • Hosting & Cloud
    • Barracuda Virus & Spam Filtering
    • Offsite Backups
    • URL Filtering
    • Website, Email & Application Hosting
  • Computer Support
    • Backups & Recovery
    • Computer Repair & Service
    • Computer Sales & Service
    • esports
    • PRO-Active at Home

 

Intrada Technologies - Custom Solutions That Work

 

Help Desk
Contact Intrada
  • Home
  • About Intrada
  • Services
  • Knowledge Base
    • Thank You - Digital Marketing
    • Thank You - Multifactor Authentication
    • Thank You - Cybersecurity
    • Thank You - Virtual Events
    • Thank You - Microsoft 365
    • Thank You - Social Media
    • Thank You - Personal Identifiable Information
    • Thank You - Web Development
    • Thank You - Managed Service Providers
    • Thank You - Social Media Advertising for Business
    • Thank You - Google Analytics (GA4) - How the Update Benefits Businesses
  • Glossary
  • Careers
  • Home
  • Information TechnologiesRE-Active & PRO-Active
    • Desktop Support & Management
    • Disaster Recovery (DR), On-Site & Off-Site Backups
    • Hardware & Software Sales
    • Help Desk, Onsite and Remote Support
    • Local Area Network (LAN) Installation & Support
    • PRO-Active Network Management
    • Server Support & Management
    • VoIP Telephony & Collaboration
    • Wide Area Network (WAN) Installation & Support
    • User Activity Monitoring
    • Managed Endpoint Detection and Response
  • Web Design & DevelopmentAdaptive & Responsive
    • Content, Messaging & Communication
    • Web Application Development
    • Website Design & Development
    • PRO-Active Website Management
  • Digital MarketingSEO & SEM Strategies
    • Content, Messaging & Communication
    • PRO-Active Internet Marketing
    • Search Engine Marketing (SEM)
    • Search Engine Optimization (SEO)
    • Social Media Marketing (SMM)
  • Hosting & CloudLinux & Microsoft Solutions
    • Barracuda Virus & Spam Filtering
    • Offsite Backups
    • URL Filtering
    • Website, Email & Application Hosting
  • Computer SupportService & Repair
    • Backups & Recovery
    • Computer Repair & Service
    • Computer Sales & Service
    • esports
    • PRO-Active at Home
  • Home
  • Knowledge Base
  • David J Steele
  • IT Security Incident Response Plan

Knowledge Base

Home
Categories
Tags
Authors
Archives
Calendar
Categories:   All Categories
Suggested keywords
x
Search
Subscribe to blog
Unsubscribe from blog
  Print

IT Security Incident Response Plan

Procedures and Policies
David J Steele
Friday, 29 July 2022
intrada-incident-response-plan

Both companies and individuals should have an IT Security Incident Response Plan. In a corporate environment, employees, vendors, and contractors need to know how to quickly report an incident to the correct people to respond and address the situation. 


What is considered an “incident”?

An incident can be an occurrence, condition, or situation arising in the course of work that resulted in or could have resulted in:

  • Loss of data, compromise of account information, exchange of PII information, unauthorized network access,
  • Phishing scam, email spoofing, or social attempt to collect information.

It is essential to understand that reporting an incident, even if you did not fall for the situation, allows the IT Department to be aware and use it to make others aware of the technique being used by cybercriminals. This increases awareness through the entire company and educates other staff that might not be as cyber-aware of the threats.

With cybercrimes continuously rising in record numbers, we cannot assume we are safe and must continue to communicate and educate everyone in the organization of the dangers and that we are all targets. Sometimes, the savviest technical users are tricked with basic techniques because it becomes almost normal behavior.

The facts are scary. With over 70% of companies in the education, research and medical industries and over 50% of IT firms being directly affected by cybercrimes, we must stay diligent; we need to keep our employees aware of current and possible threats to our organization’s systems and information.


How to build an effective and proactive IT Security Incidence Response Plan

Building an effective IT Security Incidence Response Plan involves a proactive approach.  Intrada recommends the following:

  1. Identify and appoint staff to a Center Security Team (CST). These individuals will be the single team to respond and be aware of all incidents and situations accordingly.
  2. You must communicate all incidents and situations immediately to the CST. It is then the responsibility of the team to place additional security protocols to prevent the problem from reoccurring, monitor networks for related activity and notify internal staff or send out client-wide notices with specific information. 
  3. Engage in the response phase. Intrada breaks down the response phase into four sub-categories:  detection, analysis, recovery and post-incident.  The response phase includes when the incident was first observed.  The response phase time is based on the priority of the incident.
    1. Response Phase 1: Detection (when and where the incident was first observed)
    2. Response Phase 2: Analysis (determining the type of threat - accidental, internal, intentional and impact – from no effect to high impact)
    3. Response Phase 3: Recovery (bringing affected systems back online and restoration or recovery efforts)
    4. Response Phase 4: Post-incident (within two weeks of the incident the CST should discuss lessons learned)

The simple rule of incident notification is contacting the CST when staff experience or observe any unauthorized activity that attempted or succeeded in accessing any information. The CST will then review the incident and handle the next steps in the process.

To report an incident, contact the Intrada Help Desk using the online Help Desk System or by calling 800-858-5745. The help desk team will route any incidents to the Intrada CST for review and follow-up.

 

Cybersecurity Awareness Poster 

personal identifiable information flyer Click here for a cybersecurity awareness training poster that Intrada Technologies clients may print and post to meet cybersecurity insurance requirements.
The Technical Side of SEO
How can Intrada help your organization work throug...

About the author

David J Steele

David J Steele

Subscribe to updates from author Unsubscribe to updates from author David J Steele

David Steele is the co-founder of Intrada Technologies, a full-service web development and network management company launched in 2000.  David is responsible for developing and managing client and vendor relationships with a focus on delivering quality service.  In addition, he provides project management oversight on all security, compliancy, strategy, development and network services.

Author's recent posts
More posts from author
Tuesday, 29 August 2023 Leveraging SEO for Business Growth
Friday, 25 August 2023 Intrada Technologies: Your Trusted Microsoft Partner
Tuesday, 25 July 2023 The Future of Web Analytics

Related Posts

Employee Spotlight – Caleb Hill

News and Events

Incident Response, Secret Agent Style

Procedures and Policies

The Dual-Factor Duel: SMS Text vs. the Microsoft Authenticator App

Procedures and Policies

The High Stakes of Cybersecurity: Why Businesses Can't Afford to Ignore It

Procedures and Policies

The Benefits of Single Sign-On (SSO) and How It Can Save Your Business Time and Money

Procedures and Policies

The Future of Passwords

Procedures and Policies

Contact Us

Contact Information:
  31 Ashler Manor Drive
  Muncy, PA 17756
 

Hours of Operation:
  Monday to Friday 8 AM > 5 PM EST
 

Get Directions
 800-858-5745
 
HELP DESK

OUR FOCUS

Intrada Technologies is a full-service web development and network management company with a focus on creating ongoing, trusted partnerships with each of our clients.

We make sure our clients have what they require to run their businesses with maximum efficiency and reliability, as many of their needs are mission-critical. 

Our unique, collaborative partnerships allow us to provide our clients with the assurance that we will be there when they need us.

CLIENT SERVICE TEAM

Quick Menu

  • Contact Intrada
  • Glossary
  • Help Desk
  • Knowledgebase
  • Services
  • About Intrada
  • Careers

Login

Intrada Secured Area for internal Staff resources.

  • Forgot your username?
  • Forgot your password?
Copyright © 2023 - Intrada Technologies - Privacy Policy

In order to provide you with the best online experience this website uses cookies. Delete cookies

Our website uses cookies and analytics to enhance our clients browsing experience. Learn More / I'm Good

Desktop Version
800-858-5745
Submit Ticket
Remote Control