Protecting our clients' data & best interests since 1988.
Cyber attacks are now a routine business risk, not an edge case. Recent industry reporting shows the global average cost of a data breach reached about $4.45 million dollars in 2023, a roughly 15% increase since 2020, with the United States averaging close to $9.5 million dollars per incident. At the same time, many organizations continue to underinvest in cybersecurity, often spending only a few hundred dollars a year on basic protections, while remaining attractive targets for attackers.
In that context, maintaining strong cyber hygiene and having a tested incident response plan is no longer optional. It is essential for regulatory compliance, business continuity, and reputation protection. When an incident happens, what your organization does in the first hours and days will determine the overall impact, the cost, and how quickly you can restore normal operations.
In light of successful cyberattacks on multiple governments and corporations, it begs the question - what can the rest of us do? The answer lies in prevention and planning. In the event of an attack, there are practical steps your organization can take to mitigate the impact.
Today’s threat landscape is defined by the volume, speed, and sophistication of attacks. Current studies and threat analyses highlight several key trends:
The takeaway is clear: the longer it takes to detect, contain, and recover from an attack, the more damage your business will sustain. Planning and preparation are the most effective ways to reduce that impact.
Effective response aligns well with the NIST incident response lifecycle, which organizes activities into four core phases: preparation; detection and analysis; containment, eradication, and recovery; and post‑incident activity. Even if your organization does not yet have a formal plan in place, you can still move quickly and methodically through these steps.
At the earliest sign of suspicious activity: unusual logins, disabled security tools, unexplained system behavior, or ransom notes. You should assume a potential incident and begin investigation. Confirm whether a cyber attack has occurred, what systems are affected, and whether sensitive data has been accessed or exfiltrated.
At the same time, work to contain the incident in a controlled way. This can include isolating compromised endpoints from the network, disabling or resetting potentially compromised accounts, and blocking known malicious IP addresses, domains, and command‑and‑control channels. Containment actions should be deliberate and well documented so that you do not inadvertently destroy valuable forensic evidence.
Comprehensive documentation is essential during and after a cyber attack. It supports internal decision‑making, legal and regulatory reporting, cyber insurance claims, and technical remediation. Capture as much of the following as possible, in real time:
This detailed timeline and evidence set allows digital forensics teams to reconstruct the attack path and helps leadership understand the scope, impact, and potential obligations arising from the incident.
Most organizations do not investigate and remediate serious cyber attacks using only internal resources. As soon as you confirm a likely incident, convene your internal response stakeholders: IT and security, executive leadership, legal and compliance, privacy, HR, and communications as appropriate. Establish clear ownership for technical response, regulatory analysis, and communications.
In parallel, consider engaging a qualified digital forensics and incident response (DFIR) provider and a cybersecurity consulting partner. These experts can help you preserve evidence correctly, identify the root cause, verify whether data has been exfiltrated, and guide containment and eradication in a way that aligns with recognized frameworks such as NIST, CIS, and ISO 27001. The right partner can also help you coordinate with cyber insurance carriers and evaluate whether you are meeting their requirements.
Cyber attacks are no longer only a technical problem; they carry significant regulatory, legal, and investor‑relations implications. Organizations must understand and satisfy applicable reporting and disclosure requirements to reduce downstream exposure.
Depending on the nature and severity of the incident, you may need (or choose) to notify law enforcement and relevant government agencies. For many businesses, this includes reporting cyber crime to the FBI Internet Crime Complaint Center (IC3) and, in certain circumstances, working with agencies such as the Department of Homeland Security or the Cybersecurity and Infrastructure Security Agency (CISA).
Publicly traded companies in the United States face additional obligations under the SEC’s cybersecurity disclosure rules finalized in 2023. These rules require registrants to disclose material cybersecurity incidents on Form 8‑K within four business days after determining the incident is material, and to provide annual disclosures about cybersecurity risk management, strategy, and governance. Coordinating with counsel early helps determine whether an incident is material and ensures disclosures are accurate and aligned with other regulatory communications.
If your organization collects or processes personal data, such as payment card information, personally identifiable information, or protected health information, you may be required to notify affected individuals and specific regulators under state or federal breach notification laws. Many state laws define reporting duties based on where impacted residents live, not solely where your organization is headquartered.
Click here for further information, or click here to see the individual requirements for all 50 states.
Healthcare organizations and their business associates, for example, must comply with HIPAA breach notification requirements, which include notifying the U.S. Department of Health and Human Services (HHS) and, in some cases, prominent media outlets. Across industries, working closely with legal counsel to develop compliant notification letters and public statements is essential.
Communications should be timely, clear, and consistent, and should explain what happened, what data may have been affected, what steps you are taking, and what support or protection you are offering. This approach helps maintain trust and reduces the likelihood that customers will first learn of the incident from media reports or third parties.
Once the immediate incident is contained and reported, the focus should shift to strengthening your defenses and resilience. The cost of prevention and preparation is significantly lower than the cost of repeated breaches and extended downtime.
Every organization should maintain a formal incident response plan aligned with the NIST incident response lifecycle. The plan should define:
Integrate this plan with your business continuity and disaster recovery capabilities so that you can restore critical systems in a prioritized, controlled manner while meeting defined recovery time and recovery point objectives. Regular tabletop exercises and simulations help validate assumptions, train executives and responders, and expose gaps before real events occur.
Effective cyber risk reduction starts with strong governance and day‑to‑day practices. Many of these measures align directly with leading frameworks such as CIS Controls and ISO 27001. Organizations should:
Beyond policies and awareness, organizations need technical controls that provide continuous visibility and protection. Modern security programs often focus on:
Our mission is dedicated to improving the information security of our clients, and society at large.
JANUS Associates is the nation’s first and oldest independent IT security consultancy, providing cybersecurity consulting, IT risk assessment, and incident response services to public and private sector organizations. In business since 1988, JANUS offers a full range of high-quality cyber security, privacy, and regulatory compliance services at affordable costs. Organizations seek us out to assist them with improving their cybersecurity, compliance, and privacy programs.
If your business has suffered a cyber attack, or you want to evaluate how prepared you are for the next one, JANUS Associates can help you move from reactive firefighting to proactive, standards‑based cyber risk management that protects your data, your operations, and your reputation. View Our Cyber Security Solutions here or contact us today.