Home / Digital Security Part 5: Recover quickly and get back to business
Putting a plan together in advance will help you recover faster after responding to a data security breach or attack.
If your restaurant is hit by hackers, how will you get back to normal?
The Recover function of the National Institute for Standards and Technology Cybersecurity Framework not only helps you bounce back from potential disaster but also calls for learning.
What lessons can you apply to your operations to avoid future breaches and attacks?
Think about the steps that you’ll need to take to earn back the trust of your customers. That alone will likely strengthen your resolve to improve your data security procedures and pay more attention to the first four functions of the framework, Identify, Protect, Detect, and Respond.
You need to consider, too, the financial resources it could take to recover; data breaches are expensive. It may be worth considering cyber liability insurance so that you have an extra layer of financial protection.
As noted in prior sections of this series, returning to normal after a breach can be a lengthy process. Here are some questions you should be prepared to answer:
One key thing to remember about a data security plan built on the NIST framework is that it’s never complete. Like the Hazard Analysis Critical Control Point plan that keeps your food safe, it requires constant tweaking as your operation changes and grows.
Like adding a menu item to your HACCP plan, adding a new computer or software program, changing ISP vendors, or hiring a third-party customer loyalty program administer all require attention and changes to your data security plan.
The National Restaurant Association has adapted keystone data safety precautions—developed by the National Institute for Standards and Technology—specifically for the restaurant industry. Fill out the form below to download your free copy!
Plan in advance how you’re going to respond to a data breach or a cyberattack on your systems; time is critical.
Look for the signs that will help you catch breaches before more damage is done.
First identify digital assets at risk for data breaches; then use this framework to plan out how to protect them.