{"id":746,"date":"2018-12-17T16:11:51","date_gmt":"2018-12-17T15:11:51","guid":{"rendered":"http:\/\/65.108.60.219\/?p=746"},"modified":"2025-04-25T12:06:25","modified_gmt":"2025-04-25T10:06:25","slug":"what-to-do-after-being-attacked","status":"publish","type":"post","link":"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked","title":{"rendered":"What to do after being attacked"},"content":{"rendered":"<p>You don&#8217;t want to be a victim, but you can&#8217;t always get what you want, as the song says.\u00a0 So how to respond to a cybersecurity breach?<\/p>\n<p><!--more--><\/p>\n<p>It is always stressed that investing in security is a must. Let&#8217;s not forget, however, that you can only minimize the chances of being successfully attacked and it is never possible to elevate your security level to 100%, cybersecurity is never certain. Let&#8217;s hope you never get attacked&#8230;<\/p>\n<h2>But what if it happens?<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"250\" height=\"162\" class=\"alignleft size-medium wp-image-748\" src=\"https:\/\/cyberforces.com\/wp-content\/uploads\/2018\/12\/cybersecurity-criminal-250x162.jpg\" alt=\"\" \/>In dynamically changing cybersecurity world, you need to be always looking into the future with<br \/>\na dose of pessimism. You never know when you are going to be attacked, but you must be prepared for what to do when such an incident occurs.<br \/>\nMost companies do not even consider a data recovery situation and do not test their protocols properly. To get ahead of the game, it takes you being more practical than others and while working on the best, expecting the worst.<br \/>\nTo minimize the costs of a data breach, you need to have a well prepared strategy, which involves effective communication and data recovery tactics. Most people think about creating and testing the backups but there is much more you can do to contain the devastating results of a breach. We are talking about practical procedures meant to be used as a way of minimizing the reputation losses, financial losses and losses in customers. You must have a plan ready, that considers multiple facets of your organisation.<br \/>\nIncrease your employees\u2019 awareness and your company\u2019s security.<\/p>\n<h2>It happened. How to react?<\/h2>\n<p>Dealing with the breach is stressful itself and you do not want to bother with additional technical activities around threat analysis and general cybersecurity forensic management.<br \/>\nOur team of IT Forensics Experts can help you prepare for, and handle the security incidents if such occurred. The Blue Teaming Unit can analyze the threats, investigate the breach and respond accordingly to minimize the business costs of an incident. Competently executed incident response is critical in ensuring continuous business operations and includes aspects such as maintaining systems stability and retaining positive public relations. A security breach can affect any company, but it\u2019s the incident response phase that determines the consequences of a breach.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You don&#8217;t want to be a victim, but you can&#8217;t always get what you want, as the song says.\u00a0 So how to respond to a cybersecurity breach?<\/p>\n","protected":false},"author":21,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[37],"tags":[],"class_list":["post-746","post","type-post","status-publish","format-standard","hentry","category-guide"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What to do after being attacked - CyberForces Cybersecurity<\/title>\n<meta name=\"description\" content=\"Cybersecurity is never 100% certain. Let&#039;s hope you never get attacked, but it can happen anytime. Let&#039;s briefly discuss what can be done in such case.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What to do after being attacked - CyberForces Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity is never 100% certain. Let&#039;s hope you never get attacked, but it can happen anytime. Let&#039;s briefly discuss what can be done in such case.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked\" \/>\n<meta property=\"og:site_name\" content=\"CyberForces\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-17T15:11:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-25T10:06:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberforces.com\/wp-content\/uploads\/2018\/12\/cybersecurity-criminal-250x162.jpg\" \/>\n<meta name=\"author\" content=\"Monika Talaga\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Monika Talaga\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked#article\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked\"},\"author\":{\"name\":\"Monika Talaga\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/person\/41e4a0ec86149383004ec55b5166dd13\"},\"headline\":\"What to do after being attacked\",\"datePublished\":\"2018-12-17T15:11:51+00:00\",\"dateModified\":\"2025-04-25T10:06:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked\"},\"wordCount\":384,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/2018\/12\/cybersecurity-criminal-250x162.jpg\",\"articleSection\":[\"Guide\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked\",\"url\":\"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked\",\"name\":\"What to do after being attacked - CyberForces Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/2018\/12\/cybersecurity-criminal-250x162.jpg\",\"datePublished\":\"2018-12-17T15:11:51+00:00\",\"dateModified\":\"2025-04-25T10:06:25+00:00\",\"description\":\"Cybersecurity is never 100% certain. Let's hope you never get attacked, but it can happen anytime. Let's briefly discuss what can be done in such case.\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked#primaryimage\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/2018\/12\/cybersecurity-criminal-250x162.jpg\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/2018\/12\/cybersecurity-criminal-250x162.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/cyberforces.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What to do after being attacked\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberforces.com\/#website\",\"url\":\"https:\/\/cyberforces.com\/\",\"name\":\"CyberForces\",\"description\":\"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!\",\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberforces.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberforces.com\/#organization\",\"name\":\"TestArmy Group S. A.\",\"url\":\"https:\/\/cyberforces.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"width\":1210,\"height\":173,\"caption\":\"TestArmy Group S. A.\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\",\"https:\/\/www.linkedin.com\/company\/cyberforcescom\/\",\"https:\/\/www.instagram.com\/cyberforces__\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/person\/41e4a0ec86149383004ec55b5166dd13\",\"name\":\"Monika Talaga\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f883dc5c65bcf3164c1cdb9bd5ff269b1c019f1ce8cef98a364ce3da0969228c?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f883dc5c65bcf3164c1cdb9bd5ff269b1c019f1ce8cef98a364ce3da0969228c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f883dc5c65bcf3164c1cdb9bd5ff269b1c019f1ce8cef98a364ce3da0969228c?s=96&d=mm&r=g\",\"caption\":\"Monika Talaga\"},\"url\":\"https:\/\/cyberforces.com\/en\/author\/monika\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What to do after being attacked - CyberForces Cybersecurity","description":"Cybersecurity is never 100% certain. Let's hope you never get attacked, but it can happen anytime. Let's briefly discuss what can be done in such case.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked","og_locale":"en_US","og_type":"article","og_title":"What to do after being attacked - CyberForces Cybersecurity","og_description":"Cybersecurity is never 100% certain. Let's hope you never get attacked, but it can happen anytime. Let's briefly discuss what can be done in such case.","og_url":"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked","og_site_name":"CyberForces","article_publisher":"https:\/\/www.facebook.com\/TestArmyCyberForces\/","article_published_time":"2018-12-17T15:11:51+00:00","article_modified_time":"2025-04-25T10:06:25+00:00","og_image":[{"url":"https:\/\/cyberforces.com\/wp-content\/uploads\/2018\/12\/cybersecurity-criminal-250x162.jpg","type":"","width":"","height":""}],"author":"Monika Talaga","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Monika Talaga","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked#article","isPartOf":{"@id":"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked"},"author":{"name":"Monika Talaga","@id":"https:\/\/cyberforces.com\/#\/schema\/person\/41e4a0ec86149383004ec55b5166dd13"},"headline":"What to do after being attacked","datePublished":"2018-12-17T15:11:51+00:00","dateModified":"2025-04-25T10:06:25+00:00","mainEntityOfPage":{"@id":"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked"},"wordCount":384,"commentCount":0,"publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"image":{"@id":"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked#primaryimage"},"thumbnailUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/2018\/12\/cybersecurity-criminal-250x162.jpg","articleSection":["Guide"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked","url":"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked","name":"What to do after being attacked - CyberForces Cybersecurity","isPartOf":{"@id":"https:\/\/cyberforces.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked#primaryimage"},"image":{"@id":"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked#primaryimage"},"thumbnailUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/2018\/12\/cybersecurity-criminal-250x162.jpg","datePublished":"2018-12-17T15:11:51+00:00","dateModified":"2025-04-25T10:06:25+00:00","description":"Cybersecurity is never 100% certain. Let's hope you never get attacked, but it can happen anytime. Let's briefly discuss what can be done in such case.","breadcrumb":{"@id":"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked#primaryimage","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/2018\/12\/cybersecurity-criminal-250x162.jpg","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/2018\/12\/cybersecurity-criminal-250x162.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberforces.com\/en\/what-to-do-after-being-attacked#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/cyberforces.com\/"},{"@type":"ListItem","position":2,"name":"What to do after being attacked"}]},{"@type":"WebSite","@id":"https:\/\/cyberforces.com\/#website","url":"https:\/\/cyberforces.com\/","name":"CyberForces","description":"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!","publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberforces.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberforces.com\/#organization","name":"TestArmy Group S. A.","url":"https:\/\/cyberforces.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","width":1210,"height":173,"caption":"TestArmy Group S. A."},"image":{"@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TestArmyCyberForces\/","https:\/\/www.linkedin.com\/company\/cyberforcescom\/","https:\/\/www.instagram.com\/cyberforces__"]},{"@type":"Person","@id":"https:\/\/cyberforces.com\/#\/schema\/person\/41e4a0ec86149383004ec55b5166dd13","name":"Monika Talaga","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f883dc5c65bcf3164c1cdb9bd5ff269b1c019f1ce8cef98a364ce3da0969228c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f883dc5c65bcf3164c1cdb9bd5ff269b1c019f1ce8cef98a364ce3da0969228c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f883dc5c65bcf3164c1cdb9bd5ff269b1c019f1ce8cef98a364ce3da0969228c?s=96&d=mm&r=g","caption":"Monika Talaga"},"url":"https:\/\/cyberforces.com\/en\/author\/monika"}]}},"_links":{"self":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/comments?post=746"}],"version-history":[{"count":3,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/746\/revisions"}],"predecessor-version":[{"id":250962,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/746\/revisions\/250962"}],"wp:attachment":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/media?parent=746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/categories?post=746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/tags?post=746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}