ABSTRACT

The unfortunate truth is that many cyberattacks are so covert and stealthy that they can often go unnoticed for a long period of time. While this might be a tempting option to utilize, there are certain risks that are inherent with doing this, as this is often considered one of the most drastic scenarios to take. Shutting down any systems, or going offline, is greatly dependent upon the magnitude of the cyberattack which has just occurred, and the systems and processes that are being directly impacted. Communications Internal to the business or corporation: By maintaining open lines of communication, this will help to minimize the risk of any sensitive information from being inadvertently released to third parties. The external stakeholders of the business or corporation are primarily your customers and also the suppliers and distributors who currently work. However, reporting a security breach to external stakeholders requires a different approach than reporting to internal stakeholders.