{"id":2954,"date":"2019-01-23T13:25:07","date_gmt":"2019-01-23T19:25:07","guid":{"rendered":"https:\/\/www.kraftgrp.com\/?p=2954"},"modified":"2019-01-23T13:25:07","modified_gmt":"2019-01-23T19:25:07","slug":"data-breach-next-steps","status":"publish","type":"post","link":"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/","title":{"rendered":"Data Breach – What are the next steps?"},"content":{"rendered":"
Data Breach? What Are The Next Steps?<\/strong><\/p>\n Data breach. It’s the two-word combination you never want to hear spoken within your healthcare organization. Whether you’re a doctor’s office, a hospital, or another healthcare facility, you don’t want to become a victim of digital theft. However, if you do become a victim, you need to know what your next steps are going to be.<\/p>\n The Average Data Breach<\/strong><\/p>\n One of the first things that you need to know is that most data breaches and cyber-attacks are on small to medium-sized businesses. Although you hear about large companies getting hit, it’s only because they make better news. Small businesses don’t have sophisticated IT security in place, making them an easier target.<\/p>\n Any time-sensitive information is stolen from an internal server without the authorization of the owner, it is identified as a data breach. The level of information stolen can vary from breach to breach. In some instances, it is only a small portion of the database and in other instances, it is the entire database, complete with personal information, credit cards, and other data that can pose serious problems to those who have had their information stolen from your database.<\/p>\n Recover Stolen Data<\/strong><\/p>\n The goal will be to recover any stolen data so that it does not end up on the dark web. However, this may not be possible based on the level of cyber-attack.<\/p>\n An investigation will need to be launched to understand how the breach occurred. You’ll need to know what systems were affected as well as what data has been compromised. In order to carry out the investigation, you will need to hire an external security incident response specialists. This will ensure that the issue is addressed so that you can then learn about how to fix it.<\/p>\n You will also need to contain the breach so that it doesn’t continue to cause you problems.<\/p>\n In many instances, the investigation will cause operations to cease until the IT issues are addressed.<\/p>\n Report the Data Breach<\/strong><\/p>\n The breach will need to be reported to several different entities. If you’re in the healthcare industry, you may be in violation of HIPAA as a result of the breach. In this case, HIPAA has requirements involving reporting the breach to the affected individuals,\u00a0HHS (US Department of Health & Human Services)<\/a>, and potentially even the media.<\/p>\n A number of individuals need to know about the data breach so that they can take preventative measures towards securing all of their data. For example, if people know that their credit card was part of the stolen data, they can contact the bank in order to have a new credit card issued. It’s best to seek counsel to determine who needs to know and when they need to be notified.<\/p>\n The victims are likely to have a number of questions so you will need to invest the time and resources to be able to address everything effectively.<\/p>\n Local authorities (and potentially even the federal) should also be informed of the data breach because hacking personal, financial, or business data is against the law. If the parties responsible for hacking the data are caught, they can face serious charges.<\/p>\n Protect Your Business<\/strong><\/p>\n Once you have finished cleaning up the mess of the data breach, you need to create an action plan so that you don’t encounter any future data breaches. You want to make sure that you are payment card industry (PCI) compliant. Additionally, you want to look at the level of security that you have in place and make some adjustments.<\/p>\n