Slovak national Computer Emergency Response Team.
  • Contacts
  • Report an incident
  • Text version
  • Graphic version
  • Slovenčina
www.nbu.gov.sk   www.slovensko.sk
  • About Us
  • Services
  • Statistics
  • Publications
  • Tips and Tricks
  • Legislation
  • Tips and Tricks
  • Responsible Vulnerability Disclosure Guideline
  • Security of Operational Technology Systems
    • Technological and Functional Difference between IT and OT
    • Myths and Superstitions
    • Concepts and Standards for Cybersecurity of OT Systems
    • Recommendations for Energy Sector
    • Frequently Asked Questions
  • When to Contact Us
  • Report an Incident
  • Security Recommendations
    • Online Safety Basics
      • What to Do if You Are a Victim
      • Spam
      • Phishing
      • Malicious E-mail
      • Spam and Phishing on Social Networks
      • Tips for Avoiding Being a Victim
    • Securing Accounts and Devices
      • Passwords and Securing Your Accounts
      • Hacked Accounts
      • Social Media Platforms
      • Securing Your Home Network
    • Data Backup
      • Cloud
    • Privacy Protection
      • Tips to Manage Your Privacy
    • Online Shopping
      • Shopping on the Go
      • Online Shopping Tips
      • Basic Safety and Security Tips
    • Mobile Devices
    • Malware and Botnets
      • Botnets
      • Ransomware
      • Spyware
      • Virus
      • Protection against Malware
    • Identity Theft, Fraud and Cybercrime
      • Identity Theft and Fraud
      • Cyberbullying and Harassment
  • Business Organizations
    • Asset Identification
    • Asset Protection
    • Incident Detection
    • Incident Response
    • Recovery
  • Teens
    • Tips for Teens
    • Tips for Parents
    • Parental Controls
  • Seniors
    • Tips for Seniors

Recovery

The final step of making your business more cybersecure is the recovery efforts that follow response to a cyber incident. Like the response step, recovery requires planning. The goal of recovery is to move from the immediate aftermath of a cyber incident to full restoration of normal systems and operations and the ongoing efforts at mitigation and continuous improvement over time.

Some examples of how recovery might work:

  • You had a ransomware infection. You discover the cause was the system running an older, unpatched version of an operating system and you bring that system up to date in response and get the system working again. During the recovery step you would implement more defined procedures for ensuring that all systems are updated in a timely fashion and tracking the current software state in each critical system.
  • Your system was compromised and customer data was lost when an employee lost their password. You respond to your customers following any state laws and with the advice of communications and legal counsel. Moving forward, you look to implement stronger authentication or better password practices. You start an employee training program on phishing and protecting credentials. Furthermore, you establish and train on policies about what websites and apps employees are allowed to use at work.
  • our business falls victim to the business e-mail compromise and a payment was made to a cybercriminal through the scam (usually a request for immediate payment on invoice). You respond by working with your bank to see if the payment can be returned or stopped. During recovery, work with your bank to see what other controls might be available on accounts before payments are made, train employees on phishing and e-mail security and subscribe to information feed on threat information appropriate to the your sector to increase awareness of the threat environment and share with appropriate staff.

Recovery is not just about fixing the causes and preventing the recurrence of a single incident. It’s about building out your cybersecurity posture across the whole organization, including increasing the focus on planning for future events such as:

  • Holding an cyber exercise (a simulated attack to evolve your response).
  • Reviewing staff’s capabilities and investing in staff development in cybersecurity including additional training, education or certifications.
  • Having a new staff onboarding process that includes cybersecurity training and demonstrated knowledge of key network and other workplace policies.
  • Developing regular metrics and communications of metrics to key staff about the status of your businesses cybersecurity.
  • Continuously monitor the cyber health of your organization.
  • Implementing a risk review of new technologies you may incorporate into your business and plans for maintaining the cybersecurity of the new technology over time.

Taking these steps will help you with the other steps in the cybersecurity framework going forward and may help mitigate the losses during a future incident.

(Author: National Cyber Security Alliance, published under Public License)

First publication 02. 3. 2018. Last update 16. 3. 2018 14:48
Current threats
Current threats

SK-CERT Bezpečnostné varovanie V20250520-08

Dôležitosť Kritická Klasifikácia Neutajované/TLP:CLEAR CVSS Skóre 10.0 Identifikátor Pluginy redakčného systému WordPress – ...20. May 2025

SK-CERT Bezpečnostné varovanie V20250520-07

Dôležitosť Kritická Klasifikácia Neutajované/TLP:CLEAR CVSS Skóre 9.8 Identifikátor Jenkins produkty – dve kritické ...20. May 2025

SK-CERT Bezpečnostné varovanie V20250520-06

Dôležitosť Kritická Klasifikácia Neutajované/TLP:CLEAR CVSS Skóre 10.0 Identifikátor Schneider Electric produkty – dve ...20. May 2025
all publications
CVEs
Tweets by sk_cert
Links
Links
  • ENISA
  • CERT
  • Trusted Introducer
  • FIRST
Copyright © 2025 All rights reserved - Last update 06. 06. 2025 11:44
  • Sitemap
  • Declaration of accessibility
  • Technical support
  • Content
  • Contacts
  • Report an incident
  • RSS