How to Create Your Cyber-Incident Response Plan
Any response plan worthy of being relied upon must be custom tailored to your company and regularly updated as threats, technology, and your company evolve.
July 25, 2016
You keep hearing it— it is not a matter of whether a cyber-security incident will hit your company, but when. An incident can include a number of events, such as suspicious network activity; theft or loss of physical assets like laptops, phones, or thumb drives; malware; credit card theft; phishing attempts; ransomware; or website defacement. Are you ready for any of these? Does your company have a response plan? Is it written down? Are others aware of it? Has it been tested?
First published on InsideCounsel, July 25, 2016
The articles on our Website include some of the publications and papers authored by our attorneys, both before and after they joined our firm. The content of these articles should not be taken as legal advice.
If you are interested in having us represent you, you should call us so we can determine whether the matter is one for which we are willing or able to accept professional responsibility. We will not make this determination by e-mail communication. The telephone numbers and addresses for our offices are listed on this page. We reserve the right to decline any representation. We may be required to decline representation if it would create a conflict of interest with our other clients.
By accepting these terms, you are confirming that you have read and understood this important notice.