There are many types of cyber incidents and the appropriate action depends on identifying what type of incident your business is experiencing.

Common cybersecurity incidents include:

Malware

Malware

Malware (short for ‘malicious software’) is often used by cyber attackers to gain access to your computer systems….

Learn More

Business Email Compromise

Business Email Compromise

Business Email Compromise (BEC) is a type of phishing attack that…

Learn More

Account Compromise

Account Compromise

An account becomes compromised when a cyber attacker steals your username and password.

Learn More

Ransomware

Ransomware

Desktop computers, laptops, mobile devices and cloud storage accounts are all vulnerable to ransomw…

Learn More

Man-in-the-Middle Attack

Man-in-the-Middle Attack

A man-in-the-middle (MitM) attack is a type of cyber-attack where your data…

Learn More

It may be necessary to engage a trusted cybersecurity expert to assist you to identify what type of cyber incident has occurred, and how the incident can be fully resolved.  It is essential to understand:

1
The root cause of the weakness that led to the cyber incident.
2
The extent of the damage which parts of your business systems and data did the cyber attacker get access to?

It is important to get your business up and running as soon as possible after a cyber incident.  Consider these actions: 

1
Communicate quickly with staff about the cyber incident. Give clear instructions about which systems and data they can or cannot access until otherwise informed.
2
Restore business critical data from data backups.
3
Review backups for signs of data corruption or compromise. If you are unsure if a backup has been corrupted or impacted by a cyber incident, consider engaging a cybersecurity expert to work with you to identify ‘clean’ backups.
4
Consider which parts of your business operations can be operated without access to critical systems or data – i.e. can you put workarounds in place until business critical systems and data is accessible again?
5
Communicate with Customers and suppliers to engage their support while your business is dealing with this event.
6
Lessons Learned When the cyber incident is over, take the time to consider what went right and what went wrong.  Implement any changes that will help avoid another incident, or assist in incident management in the unlucky event that another incident occurs.

Your business may have reporting obligations following a cyber incident.  Consider the following: 

1
Report Cybercrime to An Garda Síochána at your local Garda Station. Local Gardaí will guide how the criminal investigation will proceed.
2
Report to the Data Protection Commission if the cyber incident has caused a Personal Data Breach. You are obliged to report this fact to the Data Protection Commission within 72 hours of becoming aware of the breach, and you may also have obligations to notify impacted Data Subjects.
3
Notify Third Parties if they have been affected by the cyber incident. Your business may be obligated to notify third parties about the cyber incident (for example, customer or supplier contracts may include a clause requiring notification in the event of a data breach). It is very useful to maintain an up-to-date listing of these entities in the event that a cyber incident occurs.
4
If you are an Operator of an Essential Service as defined under Network and Information Systems Directive 2016/1148 find out about the security obligations and incident reporting requirements that you are subject to here: https://www.ncsc.gov.ie/oes/.
5
Have you detected an information security incident that may have national impact? As a member of the public, if you feel that you have experienced a cyber security incident that may have a national impact please contact the NCSC at the email info@ncsc.gov.ie.