So You’ve Been Attacked. Now What?

So You’ve Been Attacked. Now What?

One of the most terrifying situations your business can encounter is when it’s clear that you’ve been hacked. It can cause extreme anxiety regardless of what size of a business you run. The most important thing is to know how to react to mitigate the damage to your business’ network and reputation. Let’s go through a few steps you need to take if you’ve been hacked.

You Need to Contain the Damage!

The first thing you need to do is to do what you can to contain the situation. In doing so you are confronting the fact that getting hacked is not good, but it can get way worse if you don’t do everything you can to keep the situation in front of you. Some of the steps you can take include:

Reset All Passwords and Authentication Procedures

  • Updating all of your security software, including firewall, antivirus, and spam protection
  • Remove any suspicious software from your server or restore from backup if available

These steps will go a long way toward stopping any malicious activity that could still be at work on your network. This has to be the priority, stopping hacks from causing further damage. 

Call In the Calvary

Most small businesses rely on their users to solve their IT problems. If this is the case for your business, you will immediately want to call in people that can give you the answers that you are not able to discover yourself. Like our professional technicians at BNMC, a well-trained and certified expert can guide you through the situation with their years of acumen related to information system security. 

Report the Hack

This might be the most difficult part of overcoming a cybersecurity situation: Letting everyone know. Now, in business it is easy to pander to your clientele to position yourself for further business, but in a situation where your network has been infiltrated, you need to come out and let your customers, staff, and anyone that could have had their information stolen, know that they should take the steps necessary to mitigate the damage from the situation.

No sugar coating it: some people will get mad, and some of them will jump ship. That’s just the nature of business. Most people allow access to more of their personal information than you could ever obtain day-in and day-out, but the minute that they trust that data with your organization, they expect you to secure it. You should expect that of yourself, but sometimes things happen and you need to be upfront with people so that they can do what they need to do to control their own situation. 

Be More Proactive

This won’t help you if you’ve had to deal with one of these situations, but it will help you avoid another one. Being as proactive as you can be to ensure that your software is updated, your network is secured by tools such as antivirus and firewalls, and that your staff is properly trained on the best practices of identifying and reporting potential phishing and other social engineering attempts, is a must in today’s high-risk online environment. Your business cannot afford to let its guard down for a minute. 

If you would like to talk to one of our security professionals at BNMC about securing your network, getting the proper tools in place to be able to maintain continuity if something like this does happen, and to just be prepared overall, give us a call at 978-482-2020 today.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, May 10 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Business Computing User Tips Cloud Email Software Privacy Network Security Hackers Efficiency Microsoft Workplace Tips Business Google Data Hardware Computer Hosted Solutions Malware IT Services Communication Internet Mobile Devices Mobile Device IT Support Smartphone Small Business Android Phishing Innovation Cloud Computing Users Backup Ransomware Data Recovery Tech Term Managed IT Services Cybersecurity Windows Smartphones Saving Money Information Outsourced IT Quick Tips VoIP Network Disaster Recovery Passwords Miscellaneous Upgrade communications Browser Social Media Microsoft Office Windows 10 Facebook Data Backup Business Management Collaboration Office 365 Business Continuity Server Managed IT Services Managed Service Productivity Internet of Things COVID-19 Windows 10 Data Management Apps Gadgets Remote Work Remote Monitoring Mobile Office App Word Information Technology Analytics Save Money Infrastructure Gmail Vulnerability Artificial Intelligence Money Spam Government WiFi Conferencing Encryption Remote Workers Chrome Managed Service Provider Router Networking Company Culture Virtual Reality VPN Access Control IT Support Website Data Security Holiday Employer-Employee Relationship BYOD Google Drive Display Paperless Office Tip of the week Applications Settings End of Support YouTube Hacker Data storage Firewall Maintenance Risk Management IT Management Computing Business Technology Document Management Office Tips Development Wi-Fi Virtual Private Network Operating System Wireless Social Managed Services Computers Virtualization Employee-Employer Relationship Big Data HIPAA Bandwidth Content Filtering BDR Education Apple Avoiding Downtime Storage Antivirus Robot Compliance Unified Threat Management Automation Search desktop Regulations MSP Augmented Reality iOS Remote Computing Remote Managing Stress Server Management SaaS Outlook Bring Your Own Device Touchscreen Laptop Managed IT Solid State Drive LiFi Budget Humor Tablet Hosted Solution How To Identity Theft The Internet of Things Administration Blockchain Training Retail Alert Best Practice Hard Disk Drive Mouse OneNote Cryptocurrency Cybercrime Mobile Security Downtime Data Breach IT Two-factor Authentication Marketing Going Green Windows 7 Social Network Free Resource Vendor Management Managed IT Service Software as a Service Monitors Chromebook Customer Relationship Management Scam Business Intelligence Printing Data loss Images 101 Telephone Systems Password Break Fix Vendor Windows 8 Black Friday Language Shortcuts Value Mobile Management Reviews Unified Communications Drones Monitoring Solid State Drives Digital Payment Payment Card Servers Google Calendar Streaming IoT Processor Meetings Disaster PCI DSS Emergency Mirgation Employee-Employer Relationships Recycling Digital Logistics Safety 2FA Troubleshooting Cookies Business Analysis Mobile Device Management Scary Stories Dark Web K-12 Schools Hybrid Cloud FBI Deep Learning Network Management Inventory Running Cable Cyber Monday Computing Infrastructure Security Cameras Professional Services Profiles Network Congestion Spying Social Networking National Security Legislation Human Error Star Wars Memory Uninterrupted Power Supply Battery Buisness Analysis Chatbots Students eWaste Spyware Asset Management Alt Codes Nanotechnology Virus File Sharing Peripheral Sports Microsoft Excel Wearable Technology Scalability Network upgrade Computer Care IBM Writing K-12 Education Virtual Desktop SharePoint Shadow IT Smart Technology Alerts USB Utility Computing user treats Techology Motherboard Updates Cables Statistics Fraud Device Cost Management Reducing Cost Dark Data Files Update Lenovo Identity Mixed Reality Continuity Memes Typing Downloads LED Screen Reader Threats Charging Management Current Events Mail Merge Migration Smart Office Consulting Corporate Profile Instant Messaging Automobile Gamification Politics Shortcut Distributed Denial of Service Licensing Laptops Dongle G Suite Shopping VoIP Unified Threat Management PowerPoint Wires Bluetooth Comparison Mobility Assessment Batteries Dell Customer Service RMM Firefox Superfish Solar Work/Life Balance Co-Managed IT Smart Tech Cabling Policy Health Private Cloud IT solutions Address Permissions Work WannaCry Office Samsung Google Docs Google Maps Tech Support Hacks Patch Management Cooperation Service Level Agreement Managed Services Provider Employees User Error Onboarding GDPR Voice over Internet Protocol Bitcoin Specifications Hotspot Print Toner Internet Exlporer Myths Banking Google Wallet Slack Hard Disk Drives Holidays Heating/Cooling Multi-Factor Security Content Connectivity Huawei Procedure IT Technicians Messaging Optimization Distribution Social Engineering Business Growth FinTech Websites Halloween Staff Entertainment Leominster Gig Economy Twitter Legal Time Management Printer Digital Signage Modem Data Warehouse Upgrades Gadget Cameras Emoji Tracking Crowdsourcing Personal Information Botnet Cleaning 3D Printing CCTV Cortana Webcam Printers Machine Learning Mobile Computing Processors Unsupported Software Error Point of Sale Ben McDonald shares Travel Computer Repair Relocation Mobile Data Recovery Supercomputer CrashOverride How To Financial Regulation Motion Sickness Staffing Administrator Taxes Black Market Web Server what was your? IT Budget Law Enforcement Electronic Medical Records GPS Notifications Physical Security IT Consultant

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3