(616) 828-5360

  • Windows 10 End of Life Countdown
  • IT Services
    • IT Services
    • IT Support
    • FIT Assurance Security Business Series
    • FIT Assurance Security Live Series
  • Industries
    • Small Business
    • Manufacturers
    • Non-Profits
    • Service
  • About
    • About Us
    • Leadership Team
    • Blog
    • News
    • Privacy Policy
  • Support
  • Careers
  • Contact
  • Millennia Technologies
  • Windows 10 End of Life Countdown
  • IT Services
    • IT Services
    • IT Support
    • FIT Assurance Security Business Series
    • FIT Assurance Security Live Series
  • Industries
    • Small Business
    • Manufacturers
    • Non-Profits
    • Service
  • About
    • About Us
    • Leadership Team
    • Blog
    • News
    • Privacy Policy
  • Support
  • Careers
  • Contact
  • Millennia Technologies
Aug 13

What to Do in the First 60 Minutes of a Cyberattack

Cyberattacks are not to be underestimated. The damage that they can do—even in the first hours—is considerable. This means you need to have a strategy to respond to these incidents, conveniently called an incident response plan.

This procedure should be both tested and documented, preparing you to withstand any cyberattack with minimal damage or disruption. As you might expect, the first hour or so will be a crucial period during this process. Let’s go over what you need to do.

Essential Actions to Take in the First 60 Minutes of a Cyberattack

To be clear, this is not the stage at which you should try to fix everything. This is when you need to be in damage control mode and prepare your recovery measures.

What You Need to Do:

Contain the Threat
Before anything else, you need to keep whatever it is that’s impacting your systems from spreading further. That might mean shutting down a server or disconnecting a workstation from the network. Once you’ve stopped the spread of the attack, you can move on to the next step.

Communicate with Contacts
You should have a communication tree laid out and planned for these kinds of events, specifically one that outlines who is responsible for what. Who’s the person who informs the boss of what’s going on, and who reaches out to your business’ insurance provider and legal representation? Critically, someone needs to reach out to your IT provider (ideally, us), so who is assigned to do so? Getting everyone up to speed will be crucial to successfully navigating this kind of event.

Control Communication
As you’re sorting through the cyberattack, ensure that your business has a single point of contact handling all public communications regarding the incident. Outside of that person, your staff should not speak publicly, which will help avoid misinformation being spread and prevent your business from being liable.

Create a Record
Ensure that you document everything, including when the incident was discovered, what data was breached, and the steps taken to resolve the incident. Critically, wait for IT’s go-ahead before deleting any data from or even turning off an infected machine, as these actions can destroy valuable evidence.

This Barely Scratches the Surface of What an Incident Response Plan Should Look Like

This critical process is not one to neglect, and the only thing more important than having such a plan is to have the security that prevents you from having to use it. We can help on all fronts.

We’ll not only implement strong protections to keep your business safe, but we’ll also help you craft, test, and implement all the plans that a business needs, including an incident response plan. Ready to get started? Give us a call at (616) 828-5360.

  • Facebook
  • Twitter
  • Reddit
  • Pinterest
  • Google+
  • LinkedIn
  • E-Mail

Posts by Topic

  • Annual Golf Scramble
  • Best practices
  • Blog
  • Business
  • Cloud
  • IT Blog
  • Miscellaneous
  • News
  • Newsletter Archive
  • Security
  • Technology
  • Tip of the Week

Tags

ai Backup Best Practices Business cloud Collaboration Communication Computer Current Events cybersecurity Data Data Recovery Disaster Recovery Efficiency Email Hackers Hardware Innovation IT Services IT Support Malware Managed Service Miscellaneous Network Security news new staff members Outsourced IT Phishing Printers Productivity Quick Tips Ransomware Saving Money security Small Business Smartphone Software Technology Tip of the Week trust Upgrade User Tips Windows Windows 7 Workplace Strategy

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • July 2024
  • November 2023
  • October 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • September 2021
  • January 2021
  • October 2020
  • June 2020
  • January 2020
  • September 2019
  • July 2019
  • June 2019
  • November 2018
  • February 2018
  • January 2018
  • November 2017
  • October 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • July 2015
  • June 2015

Recent Posts

  • How Well Does a 4-Day Workweek Work? Ask Iceland!
  • 3 Ways to Stop Smartphone Data Theft
  • Six Options for Business Virtualization
  • Why and How a Technology Refresh is Actually Worth It
  • Analytics Can Help You Put Your Business in Better Position
  • Windows 10 End of Life Countdown
  • IT Services
    • IT Services
    • IT Support
    • FIT Assurance Security Business Series
    • FIT Assurance Security Live Series
  • Industries
    • Small Business
    • Manufacturers
    • Non-Profits
    • Service
  • About
    • About Us
    • Leadership Team
    • Blog
    • News
    • Privacy Policy
  • Support
  • Careers
  • Contact
  • Millennia Technologies
  • Windows 10 End of Life Countdown
  • IT Services
    • IT Services
    • IT Support
    • FIT Assurance Security Business Series
    • FIT Assurance Security Live Series
  • Industries
    • Small Business
    • Manufacturers
    • Non-Profits
    • Service
  • About
    • About Us
    • Leadership Team
    • Blog
    • News
    • Privacy Policy
  • Support
  • Careers
  • Contact
  • Millennia Technologies