{"type":"document","data":{"id":"b8167905-c4e4-4b6e-851e-296281b046aa","localeString":"en-GB","publishDate":"2024-12-10T13:51:10.836+01:00","contentType":"onecms:editorialPage","hasMacro":false,"flexPageMetadata":{"afmBanner":false,"robotInstruction":{"noIndex":false,"noFollow":false},"description":"Reduce the impact of a cyber-attack thanks to a cyber security response plan"},"mainHeaderZone":{"componentType":"editorialHeader","coreHeader":{"title":"The cyber security response plan","body":"All companies should have a cyber security response plan. \r\nCertainly, because the creation of this plan forces us to think about possible incidents and start preparing for them. But even more so because this plan will save time and therefore reduce the impact of a cyber-attack the day it happens."},"backLink":{"textLink":{"url":"/en/business/news/secure-business","text":"secure business"}},"date":"2024-12-10","readingTime":5},"flexZone":{"flexComponents":[{"componentType":"highlight","title":"Work with ING's experts to develop your rapid response plan and strategy","richBody":{"value":"<p>Alexandre Pluvinage is head of anti-fraud and online security awareness at ING Belgium. During a training session of half a day he will train you in the basics of IT security, support you in devising your cyber security strategy and show you how to set up a rapid response plan. Download <a href=\"https://assets.ing.com/m/170bd0f8e61ebccd/original/Info-leaflet-cybersecurity-strategy_ENG.pdf\">our leaflet</a> for more details.</p><p><a href=\"https://www.ing-events.be/cyberstrategy25/fr/registration\">Register here</a></p>"},"textLinks":[{"url":"/en/business/news/secure-business/business-trainings","text":"Discover all the information about our trainings in cybersecurity"}]},{"componentType":"sectionTitle","title":"Create a response plan tailored to your needs"},{"componentType":"paragraph","richBody":{"value":"<p>The cyber security response plan can be more or less extensive and developed. It can cover every aspect of the company&apos;s cyber security. This is the case, for example, with the <a href=\"https://ccb.belgium.be/en/document/cyber-security-incident-management-guide\">incident management guide</a> offered by the Belgian Cyber Security Centre and the Belgian Cyber Security Coalition. </p><p>A simplified version of this plan, more suitable for SMEs, will contain a description of the first steps and the people needed to respond in the event of a cyber-attack.  </p>"}},{"componentType":"sectionTitle","title":"How to prepare it"},{"componentType":"paragraph","richBody":{"value":"<p>The cyber security response plan should ideally be drawn up in conjunction with the company or organisation’s IT manager and management. It is part of the company&apos;s <a data-type=\"internal\" href=\"/en/business/news/secure-business/business-cyber-hygiene\">cyber security strategy</a>.</p>"}},{"componentType":"sectionTitle","title":"What to consider (simplified version of the response plan)"},{"componentType":"paragraph","richBody":{"value":"<p>The most important elements are:  </p><ol><li>The people who need to be present in the crisis unit (their mobile phone numbers, email addresses and the people replacing them).</li><li>The venue for the first meeting. This meeting place can of course be on company premises. However, if the people identified in point 1 are all located in an area far from the company’s offices, a rented office space or one of the person’s homes may be more effective. It should also be borne in mind that access to the company could be temporarily impossible if doors are opened with badges linked to the IT system (potentially blocked by the cyber-attack).  </li><li>The first actions to be taken and the communications to be prepared.  </li></ol><p><br />(1,2) For your facilitation, we created <a href=\"https://assets.ing.com/m/24792b662ca02d79/original/Cyber-attack-response-plan-template-EN.pdf\">a template</a> you can use to centralize the required contact information. </p><p><br />(3) These first actions can be:  </p><ul><li><p>Do not switch on the company’s computers </p></li></ul><ul><li><p>Do not switch off machines that are already switched on but disconnect them from the Internet. </p></li><li><p><a href=\"https://ccb.belgium.be/en/cert/first-port-call-event-cyberattack\">More information on the CERT.be website</a> </p></li></ul><p>It is important to notify your bank of the incident as soon as possible so that it can block the company&apos;s accounts as a precaution during the incident. This prevents cybercriminals from accessing your accounts during the attack. </p>"}},{"componentType":"sectionTitle","title":"Where to keep the plan?"},{"componentType":"paragraph","richBody":{"value":"<p>The crisis plan must not be stored solely on the computers of the people involved in the plan. These machines could be inaccessible during the cyber-attack. </p><p>It is best to print a copy for each of these people so that they can keep it at home. A copy will also be available in the workplace. </p><p>It&apos;s also a good idea to have a version on your mobile phone and to save the contact details of all the people involved. </p>"}},{"componentType":"sectionTitle","title":"Updates and tests"},{"componentType":"paragraph","richBody":{"value":"<p>The plan must be updated each time one of the people mentioned leaves the company or changes position.  </p><p>It is best to review the plan once a year. </p><p>In addition, testing this plan annually helps to familiarise the company&apos;s management with implementation of the plan. Responding rapidly to a cyber-attack considerably reduces the impact of the attack on the company or organisation. The more management is trained in how to implement the plan, the less serious the attack will be. </p>"}}]},"complementaryZone":{"flexComponents":[{"componentType":"sectionTitle","title":"Also interesting!"},{"componentType":"cards","cards":[{"componentType":"articleCard","cardType":"article","cardSize":"medium","title":"Your company and the NIS2 Directive","body":"Is your company subject to NIS2 and what does this mean?","image":{"transformBaseUrl":"https://assets.ing.com/transform/31ab1391-5af1-4c56-bac5-2bce3d7fc151/closedlock2","type":"image","width":160,"original":"https://assets.ing.com/m/72091172e72f6ae6/original/closedlock2.svg","extension":"svg"},"date":"2024-07-25","link":{"url":"/en/business/news/secure-business/my-company-and-nis2"}},{"componentType":"articleCard","cardType":"article","cardSize":"medium","title":"Protect your company against cybercriminals? Yes, you can!","body":"Follow our cybersecurity trainings and close the door to cybercriminals","image":{"transformBaseUrl":"https://assets.ing.com/transform/9b6efb10-8f60-41f5-bac3-5e4e15706ac1/Silhouette-of-a-business-man-walking-along-a-passage-with-green-trees-reflecting-in-the-glass","type":"image","width":5200,"altTextEN":"\"\"","altTextNL":"\"\"","altTextFR":"\"\"","altTextDE":"\"\"","original":"https://assets.ing.com/m/6dbf2299c845b8ad/original/Silhouette-of-a-business-man-walking-along-a-passage-with-green-trees-reflecting-in-the-glass.jpg","extension":"jpg"},"date":"2024-03-20","link":{"url":"/en/business/news/secure-business/business-trainings"}},{"componentType":"articleCard","cardType":"article","cardSize":"medium","title":"Corporate cyber hygiene","body":"Provide the necessary IT-security to your organisation","image":{"transformBaseUrl":"https://assets.ing.com/transform/0443f2bf-bf50-4e13-b816-c139ff25ed6c/Keys-on-a-board","type":"image","width":3872,"original":"https://assets.ing.com/m/4f0a0c82c1ad42b1/original/Keys-on-a-board.jpg","extension":"jpg"},"date":"2023-08-09","link":{"url":"/en/business/news/secure-business/business-cyber-hygiene"}},{"componentType":"articleCard","cardType":"article","cardSize":"medium","title":"Cybersecurity awareness for business employees","body":"Reduce risks and protect confidential company data","image":{"transformBaseUrl":"https://assets.ing.com/transform/cadf3a99-6d76-4dba-97c4-f983a535a2e8/Startups-presentatie_Private_Banking","type":"image","width":640,"original":"https://assets.ing.com/m/6476ed146ead66f5/original/Startups-presentatie_Private_Banking.jpg","extension":"jpg"},"date":"2023-08-09","link":{"url":"/en/business/news/secure-business/cyber-awareness-employees"}}]}]}}}