UnHacked Episode 17: "You Can Never Get UnHacked"

Key Topics

Cybersecurity Credentials and Verification

  • There are minimal legal requirements to become an IT security provider
  • Only basic business licenses are typically required
  • No standardized certifications or credentials are mandatory
  • Businesses should seek third-party verification of their IT provider's work
  • Regular vulnerability scans and assessments are recommended

Recent Breach Case Study: London Drugs

  • Major pharmacy chain in Western Canada (80 locations)
  • System breach resulted in 5+ days of complete store closure
  • Potential compromise of sensitive customer data
  • Significant financial impact (millions in losses)
  • Limited public communications citing "abundance of caution"
  • Phones restored after 4 days, indicating severity of breach

Incident Response Plan Components

Preparation Phase

  • Identify potential threats and vulnerabilities
  • Document all systems and applications in use
  • Create containment strategies
  • Establish clear roles and responsibilities

Initial Response

  • Contact insurance provider before any remediation
  • Engage legal counsel
  • Coordinate with PR team
  • Avoid destroying potential evidence

Operational Continuity

  • Develop manual/offline business procedures
  • Create separate teams for technical recovery and business operations
  • Establish backup communication methods
  • Plan for temporary workarounds

Recovery Process

  • Follow insurance provider's protocols
  • Document all steps taken
  • Preserve evidence for investigation
  • Implement lessons learned

Best Practices

  • Regular testing of incident response plans ("fire drills")
  • Multiple admin access points for critical systems
  • Clear documentation of all business systems and processes
  • Regular backup testing and verification
  • Proactive relationship with insurance providers
  • Understanding of insurance requirements and procedures

Schedule Your Free Security Assessment

Key Takeaways

  1. Prevention is cheaper than remediation
  2. Every business needs a tested incident response plan
  3. Technical recovery is only one part of breach response
  4. Business continuity planning is crucial
  5. Regular testing and verification of security measures is essential

Recommendations for Business Owners

  • Get a thorough security assessment
  • Develop and test an incident response plan
  • Maintain updated documentation of all systems
  • Establish relationships with security providers and insurers
  • Regular testing of backup and recovery procedures
  • Plan for offline operations during outages

Future Episode Preview

  • ROI of keeping equipment and software up to date
  • Impact of outdated technology on employee satisfaction and productivity
  • Cost analysis of proactive vs. reactive IT management