{"id":5372,"date":"2016-06-21T10:00:45","date_gmt":"2016-06-21T14:00:45","guid":{"rendered":"https:\/\/www.cscdigitalbrand.services\/blog\/?p=5372"},"modified":"2019-12-18T10:57:54","modified_gmt":"2019-12-18T15:57:54","slug":"cyber-attacks-do-you-have-a-response-plan","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/cyber-attacks-do-you-have-a-response-plan\/","title":{"rendered":"Cyber attacks: Do you have a response plan?"},"content":{"rendered":"<p>In the last two weeks of January 2016 alone, 52 mainstream cyberattacks were committed against governments, public, and private sector companies around the world<sup>1<\/sup>. That\u2019s more than three attacks a day. Experts are warning that it\u2019s no longer if\u2014but <strong>when<\/strong>\u2014your company will be targeted. And when it is, are you prepared? Do you have a response plan in place to recover from, or even thwart an attack? <em>IT Pro<\/em> reports that 50% of businesses worldwide have no countermeasures against Distributed Denial of Service (DDoS) attacks\u2014and that\u2019s just the most popular attack your company is facing right now.<\/p>\n<p>Cyber threats are increasing and it\u2019s essential that businesses are prepared. Attack activity has increased 85% year over year, and it doesn\u2019t appear to be slowing down any time soon.<\/p>\n<p>Investing in a robust Domain Name System (DNS) and DDoS protection is highly recommended, but as a minimum, businesses should protect themselves by ensuring DDoS attacks are covered under an Incident Response Plan (IRP) as part of a larger Disaster Recovery Plan and Business Continuity Plan. And most importantly, <strong>the IRP should be rehearsed.<\/strong><\/p>\n<p><em><strong>Create an incident response team<\/strong><\/em><br \/>\nTo get started, you need an incident response team. It sounds easy to create a team\u2014but who should be on this team; who within your company needs to be contacted in the event of an attack; who makes the decisions on how to react; and what do they communicate to whom?<\/p>\n<p>DDoS attacks leveraged at name servers will likely take out email, and also Voice Over IP telephone systems. It will also take out virtual private networks. Team members should share their landlines and cell phone numbers as back up contact information and make sure it\u2019s available offline; it may be the only way to communicate. All team members should also be aware of a \u201cWar Room\u201d to call or as a place to meet if an event occurs. This is a critical part of mitigation. You also want to include key DNS partners on your team, like Corporation Service Company<sup>\u00ae<\/sup> (CSC<sup>\u00ae<\/sup>).<\/p>\n<p><em><strong>Purpose of an IRP<\/strong><\/em><br \/>\nAccording to <em>CIO Insight<\/em>, the average cost of <strong>one hour of down time is $105,710 and the average network outage is 18 hours<\/strong><sup>2<\/sup>. Ponemon Institute estimates that the average annual cost to companies from DDoS attacks is <strong>$126,153<\/strong>. Meet with the IRP team regularly to rehearse your response and discuss threats\u2014and if under attack, first verify that it\u2019s a true cyber attack. Beyond that, always keep your company management informed and discuss:<\/p>\n<ul>\n<li>The root cause of the attack each time<\/li>\n<li>How to reduce the incident impact<\/li>\n<li>How to maintain or restore business functions<\/li>\n<li>How to improve security to prevent future attacks<\/li>\n<li>When to send external communications and to whom (the press, customers, staff); create generic templates signed off by senior management in advance, because nobody wants to write marketing copy under pressure<\/li>\n<\/ul>\n<p>With the threats growing in size and scope, companies need to be proactive. If you don\u2019t have an IRP, it\u2019s probably time to get one together.<\/p>\n<p>For more information on <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cybersecurity-services\/dns-services\">enterprise DNS services<\/a> and <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cybersecurity-services\/ddos-protection\">DDoS protection<\/a>, contact CSC Digital Brand Services or visit <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/cybersecurity-services\/dns-services\" target=\"_blank\" rel=\"noopener noreferrer\">cscdigitalbrand.services<\/a>.<\/p>\n<p><sup>1<\/sup> <a href=\"http:\/\/www.hackmageddon.com\/2016\/02\/08\/16-31-january-2016-cyber-attacks-timeline\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.hackmageddon.com\/2016\/02\/08\/16-31-january-2016-cyber-attacks-timeline\/<\/a><br \/>\n<sup>2<\/sup> <a href=\"http:\/\/www.cioinsight.com\/security\/slideshows\/10-things-to-know-about-the-cost-of-dns-attacks.html\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.cioinsight.com\/security\/slideshows\/10-things-to-know-about-the-cost-of-dns-attacks.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the last two weeks of January 2016 alone, 52 mainstream cyberattacks were committed against governments, public, and private sector companies around the world1. That\u2019s more than three attacks a day. Experts are warning that it\u2019s no longer if\u2014but when\u2014your company will be targeted. And when it is, are you prepared? Do you have a [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9,171,167,521],"tags":[334,522,290,523],"class_list":["post-5372","post","type-post","status-publish","format-standard","hentry","category-brands","category-cyber-security","category-internet","category-send-email","tag-cyber-attacks","tag-ddos-attacks","tag-dns","tag-incident-reponses-plan"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber attacks: Do you have a response plan? | CSC<\/title>\n<meta name=\"description\" content=\"In the last two weeks of January 2016 alone, 52 mainstream cyberattacks were committed against governments, public, and private sector companies around\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/cyber-attacks-do-you-have-a-response-plan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber attacks: Do you have a response plan? | CSC\" \/>\n<meta property=\"og:description\" content=\"In the last two weeks of January 2016 alone, 52 mainstream cyberattacks were committed against governments, public, and private sector companies around\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/cyber-attacks-do-you-have-a-response-plan\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-21T14:00:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-18T15:57:54+00:00\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-attacks-do-you-have-a-response-plan\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-attacks-do-you-have-a-response-plan\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"Cyber attacks: Do you have a response plan?\",\"datePublished\":\"2016-06-21T14:00:45+00:00\",\"dateModified\":\"2019-12-18T15:57:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-attacks-do-you-have-a-response-plan\\\/\"},\"wordCount\":549,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"keywords\":[\"cyber attacks\",\"DDoS attacks\",\"DNS\",\"Incident Reponses Plan\"],\"articleSection\":[\"Brand Protection\",\"Cyber security\",\"Internet\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-attacks-do-you-have-a-response-plan\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-attacks-do-you-have-a-response-plan\\\/\",\"name\":\"Cyber attacks: Do you have a response plan? | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"datePublished\":\"2016-06-21T14:00:45+00:00\",\"dateModified\":\"2019-12-18T15:57:54+00:00\",\"description\":\"In the last two weeks of January 2016 alone, 52 mainstream cyberattacks were committed against governments, public, and private sector companies around\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-attacks-do-you-have-a-response-plan\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-attacks-do-you-have-a-response-plan\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/cyber-attacks-do-you-have-a-response-plan\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber attacks: Do you have a response plan?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber attacks: Do you have a response plan? | CSC","description":"In the last two weeks of January 2016 alone, 52 mainstream cyberattacks were committed against governments, public, and private sector companies around","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/cyber-attacks-do-you-have-a-response-plan\/","og_locale":"en_US","og_type":"article","og_title":"Cyber attacks: Do you have a response plan? | CSC","og_description":"In the last two weeks of January 2016 alone, 52 mainstream cyberattacks were committed against governments, public, and private sector companies around","og_url":"https:\/\/www.cscdbs.com\/blog\/cyber-attacks-do-you-have-a-response-plan\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2016-06-21T14:00:45+00:00","article_modified_time":"2019-12-18T15:57:54+00:00","author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/cyber-attacks-do-you-have-a-response-plan\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-attacks-do-you-have-a-response-plan\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"Cyber attacks: Do you have a response plan?","datePublished":"2016-06-21T14:00:45+00:00","dateModified":"2019-12-18T15:57:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-attacks-do-you-have-a-response-plan\/"},"wordCount":549,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"keywords":["cyber attacks","DDoS attacks","DNS","Incident Reponses Plan"],"articleSection":["Brand Protection","Cyber security","Internet","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/cyber-attacks-do-you-have-a-response-plan\/","url":"https:\/\/www.cscdbs.com\/blog\/cyber-attacks-do-you-have-a-response-plan\/","name":"Cyber attacks: Do you have a response plan? | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"datePublished":"2016-06-21T14:00:45+00:00","dateModified":"2019-12-18T15:57:54+00:00","description":"In the last two weeks of January 2016 alone, 52 mainstream cyberattacks were committed against governments, public, and private sector companies around","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/cyber-attacks-do-you-have-a-response-plan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/cyber-attacks-do-you-have-a-response-plan\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/cyber-attacks-do-you-have-a-response-plan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber attacks: Do you have a response plan?"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/5372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=5372"}],"version-history":[{"count":5,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/5372\/revisions"}],"predecessor-version":[{"id":8555,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/5372\/revisions\/8555"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=5372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=5372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=5372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}