Can Your Business Survive Being Hacked?

Can Your Business Survive Being Hacked?

Find out how you should respond to being hacked.

Cybercriminals and data thieves are experts at exploiting the vulnerabilities of notebooks and tablets. Data breaches and intrusions reported by businesses of all sizes are at an all time high. Could your company recover from identity theft, stolen competitive information, or compromised customer data?

Investigate and verify the attack

It’s important to have an incident response team in place that can immediately swing into action following a cyberattack. Quick response is the key to limiting damages. According to a Ponemon Institute study, leveraging an incident response team was the single biggest factor associated with reducing the cost of a data breach — saving companies nearly $400,000 on average. Here are the first, critical steps your team should take:

  • Identify the compromised systems
  • Investigate IP addresses used in the attack
  • Determine the type of attack, e.g., virus, malware, unauthorized access, etc.

Once you know the details of the threat or vulnerability, you can immediately warn other users on the network and inform them what type of attack to look for and how to avoid it.

Mitigate and isolate the damage

Don’t panic and shut down your entire network, disrupting your business operations and risking missed deadlines, angry customers, and damage to your company reputation. Instead, get busy isolating and mitigating damage to affected systems.

Don’t hesitate to notify customers and stakeholders of the attack. It’s better to admit to a data breach up front rather than keep the attack a secret. Should news get out that you’ve tried to hide or cover up a security breach, your company’s integrity could take a big hit.

Quarantine all infected computers or impacted applications on the network. By isolating affected systems, you can contain the damage and prevent any virus or malware from spreading. Your incident response team should also look for backdoors that hackers may have set up to get into your system in the future. If vendors, customers, or suppliers have been hacked, block all access from these accounts until security issues have been resolved.

Plug the holes, spread the word

Change company-wide passwords for access to any systems that were affected, and install clean data and software backups, preferably from off-site devices not connected to your network. Make sure there are no default “admin” or other obvious usernames and passwords in place that could allow hackers back in. Then, spread the word: Take steps to ensure all employees are trained in basic cybersecurity procedures and policies, such as keeping passwords secure, not sharing personal information, and avoiding emailed links and downloads.

Get the best protection for endpoint devices

By now, you’ve probably figured out that the best way to survive a data breach is not to have one. Endpoint devices have become the latest target, and attacks against notebooks and desktops increased by 132 percent in 2016 alone. That’s why it’s essential to strengthen endpoint security by replacing old, outdated, or insecure devices with notebooks and tablets equipped with multiple levels of protection to help secure your company’s valuable data assets.

About the Author

Jerry Young is the Principal Solution Architect at MNJ Technologies.

Featured

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

  • Report: Cyber Attackers Continue to Turn to AI-Based Tools to Avoid Detection

    Comcast Business recently released its 2025 Cybersecurity Threat Report, a comprehensive analysis of 34.6 billion cybersecurity events detected between June 1,2024 and May 31, 2025. Now in its third year, the report offers business leaders a unique perspective into the evolving threat landscape and provides actionable insights to help organizations strengthen their defenses and align cybersecurity with business risk. Read Now

  • Axis Communications Creates AI-powered Video Surveillance Orchestra

    What if cameras could not only see the world, but interpret it—and respond like orchestra musicians reading sheet music: instantly, precisely, and in perfect harmony? That’s what global network technology leader Axis Communications set to find out. Read Now

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.