Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Actionable tips to create a business cybersecurity plan

By Nathan Little
data-cyber-software-freepik
November 17, 2021

Not all disasters are created equal. Tornados call for sheltering in a basement away from windows, floods call for finding higher ground, and fires mean leaving the building altogether. Depending on the nature of the incident, the instructions for immediate safety and recovery are vastly different. The logic behind these protocols is obvious, so why are security plans so often switched, confused, or ignored in cyber disasters?


Cyberattacks can be just as varied as natural disasters. Phishing attacks, brute-forcing accounts, and complicated ransomware executions are all different disasters, and they call for a different safety procedure each. Just as you wouldn’t recommend going to a basement during a fire nor running outside during a tornado, it is crucial to outline safety plans according to cyber disasters. Organizations can do this by implementing a business cybersecurity plan.


What is a Business Cybersecurity Plan?

 

At its core, a business cybersecurity plan is a playbook that addresses the key players, the emergency contacts, and the framework to respond to cyber incidents. This is a more specific safety plan that provides information beyond business interruption and considers all cyberinfrastructure within an organization. A plan like this goes beyond the basic “stop, drop, and roll” safety instructions — cybersecurity is an industry that changes daily, and the plans that protect organizations need to stay just as agile. Here are three things to keep in mind for organizing a plan:


Keep your plan business-specific.


How does your organization interact with technology on a daily basis? For example, do you rely on online payment card transactions? Do you collect healthcare data on patients? Do you have any major systems open to the public internet to run your day-to-day operations? When creating a cybersecurity plan to comply with regulations, provide information to insurance, and define your priorities, take your own organization’s needs into account.


Expect updates.


A good cybersecurity plan leaves room for updates, and better yet, is informed by the latest security strategies. This should be considered a living document that can change according to the latest threat intelligence, the newest third-party vendors you bring on board, the type of attack you may fall victim to, etc. As such, we don’t recommend harsh, end-all-be-all instructions. Since updates are so frequent in cyber, it’s better to keep a trusted expert nearby for a course of action rather than an outdated instruction.


Cover all your bases.


You wouldn’t install smoke detectors in only half the rooms of your house — make sure you don’t cover only half of your technological infrastructure. Some basic considerations include your email service provider, cloud storage provider, any Software as a Service (SaaS) products, and any other third-party vendors that have access to your internal network. Of course, your infrastructure will depend on the nature of your organization, but be sure to include these tenets in your cybersecurity plan.


How to make a Business Cybersecurity Plan


Just as different buildings require different exit routes, organizations require customized cybersecurity plans to account for their own unique structure. Our top three are vital features that should be included in every disaster recovery plan when crisis strikes — emergency contacts, proper communications, and a holistic incident response plan. 

 

 For emergency contacts, try to go beyond the typical phone book format. Instead, organize your teammates and assign members as most appropriate to respond to a cyber incident for your business. In keeping all hands on deck, try to include departments from IT, security, and legal to communications, HR, and risk management. 

 

 Working through proper communication channels in order of primary and secondary contacts will help moderate and mitigate the confusion that’s bound to arise amid a cyberattack. If your organization’s resources are limited in this area, be sure to bring on security experts to accurately alert you to attacks and field incident response from there.


Once contacts and communications are in order, you are well-suited to dive deeper into an incident response plan. There are a few guidelines that all organizations can follow in the event of an emergency:


Contain.


Cyberattacks like ransomware rely on spreading to as many workstations as possible within a network, so once an attack is discovered, containing it is most often the top priority. Enact your cybersecurity plan and bring appropriate teammates, IR firms, and cyber insurance resources to your aid to contain the incident. Usually, this includes disconnecting devices from the network if possible rather than just turning them off.


Assess.


Your cybersecurity contacts and resources will reiterate this message: Preserve what you can. To learn how an attacker infiltrated the network, what actions they took, and how they distributed their attack is crucial for providing evidence, contributing to overall threat intelligence, and in some cases, how to restore data they may have manipulated. Therefore, be sure to preserve forensic evidence where available, usually in the form of logs. Keep in mind if you rely on a Managed Service Provider (MSP) or another third-party for your critical infrastructure, they may possess the logs that pertain to them.


Some may argue that this hinders the response (working through logs can be very time-consuming). However, this is important for contributing to overall threat intelligence, further protecting other organizations, and disclosing vulnerabilities that others may fall victim to.


Communicate.


As the response is underway, communicate with your stakeholders only as necessary. Be mindful to include only the most relevant information that pertains to them specifically. For example, this could be with internal employees on how they need to conduct their work during the response and restoration, what actions they must take to enforce (or re-enforce) their security measures on individual accounts, or what to expect in the coming days/weeks.


With more sensitive data such as Personally Identifiable Information (PII), SSNs, credit card numbers, etc., be sure to disclose a “breach” only after it has been considered one from the proper authorities — ideally from a privacy attorney on your cybersecurity plan contact list.


Learn.


While each incident is unique, that doesn’t mean it’s a foregone conclusion. There is something to be learned from each zero-day vulnerability, each open Remote Desktop Protocol connection, even each phishing campaign from a threat actor. Learn and adapt your cybersecurity plan to accommodate your recent incident, and apply organization-wide changes wherever necessary.


Not all disasters are created equal, but with proper planning, attention to updates, and trusted experts on your side, your organization can remain calm, agile, and, most importantly, safe.

KEYWORDS: business continuity cyber security incident response risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

 

Nathan Little is the Vice President of Digital Forensics and Incident Response and Partner at Tetra Defense. He leads the incident response and data breach investigation team, providing cybersecurity, incident response, digital forensics, and data recovery services to legal and insurance professionals, corporate IT departments, in-house security teams, law enforcement, and everything in between.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • team-building-freepik1170x658.jpg

    5 tips to develop a best-in-class cybersecurity function

    See More
  • cyber5-900px.jpg

    ISA and European Directors Partner to Create a Pan-European Culture of Cybersecurity

    See More
  • students-freepik-(1).jpg

    A back-to-school plan for reaching the next generation of cybersecurity professionals

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!