Reactive Response in Cybersecurity is No Longer Enough 

This is a writing sample from Scripted writer Jane Haynie

Reactive Response in Cybersecurity is No Longer Enough 

The best defense is a good offense. Have you heard this idiom before? It doesn’t just apply to sports. Even in the world of information technology, an offensive, or hunting, approach will give you a greater standard of protection against cyber intruders.

Unfortunately, many IT companies still utilize a primarily reactive approach to security practices, leaving them vulnerable and ill-prepared for the techniques many offenders will employ to use their own security against them. The landscape has changed and your company must keep up.  

What are the benefits of approaching security from an offensive position?

  • Incidents can be detected earlier

  • Response teams can jump into action before a vulnerability becomes severe

  • Preparation is more intense and effective

  • Containment strategies are more thorough

  • Adversaries have fewer opportunities to find alternate means of entry into the system

Of course, these benefits are only available to you if your team follows through appropriately on all threats. Many threats have already been in place for weeks, months, or potentially even years before they are detected by your system or your team. 

Failure to follow the prescribed six-step process could result in spastic response-only techniques that rarely get to the root of the problem. To be effective, it’s important to conduct proper and thorough scoping and containment protocols in order to surround the enemy and close in.

So let’s review the Six-Step Incident Response Process with emphasis on the tasks often overlooked by security teams:

Step 1: Preparation

This means setting up the system, assigning roles, and creating emergency contact lists.

Step 2: Identification

This includes identifying where the attack came from as well as the systems that were affected and creating a full backup to obtain as much information about the incident as possible. 

Step 3: Containment

Freezing systems, blocking IP addresses, and disconnecting network connections are tasks involved in this step to ensure the threat doesn’t spread further.

Step 4: Eradication

You’ll need to get rid of any infected files, folders, or compromised systems and potentially do an entire system reinstall. This step requires erring on the side of caution.

Step 5: Recovery

This involves re-connecting to the network and getting your systems back online and into operation.

Step 6: Follow-up

You’ll need to tighten up security, increase protocols, and take any additional steps necessary to ensure the breach doesn’t happen again.

In this process, step 2 is where many teams try to skip ahead. Resist this temptation — identification is a crucial step to winning the war over the battle.

If you find your team is overworked or underperforming in this area, consider utilizing Atrion’s Computer Hacking Forensic Investigation (CHFI) services. We can aid you by ensuring the examination process is detailed, forensically sound, defensible, and the results repeatable.

For more information, visit our website or contact us at 908-231-7777 or info@atrioncomm.com.

Written by:

Jane Haynie
Hire Jane H
I have been a professional writer for tech and SaaS companies for over ten years. My specialty is taking complex subjects and making them compelling and simple to digest. I like to infuse creativity and humor into my work, when appropriate, and excel at staying focused on the mindset and lifestyle of the target audience. I also own a local gym and can write about fitness, diet, lifestyle, and related topics.
Customer Ratings:
Star Star Star Star Half-star
22 reviews
Hire Jane H

Power your marketing with great writing.

Get Started