< Back to Thought Leadership

The Importance of Incident Response Plans – Recovery

By: Tom Skoog, Cybersecurity & Data Management Practice Leader

This is our fourth article in a five-part series on the importance of incident response planning as part of your cybersecurity program. The purpose of an Incident Response Plan is to proactively plan the actions you will take if you are faced with a serious cybersecurity event, while you are not responding to a stressful situation.

The first article discussed the preparation phase of the plan and last month we explored containment and eradication. As stated previously, The National Institute of Standards and Technology (NIST) has developed a framework that all incident response plans should consider, including:

Ransomware Incident Response Plan – Recovery 

Today we are focusing on the next phase of the response plan which is Recovery. This is when you restore the affected systems and return to normal day-to-day operations after an incident such as a ransomware infection/attack.

Often, this involves restoring not only the operating system but the business applications and associated data for that device (workstation/server). This is dependent on whether the gaps in the systems have been patched and how your organization will ensure these systems are not breached again.

Importance of Backups

The strength of your backups is a critical element to the effectiveness of the recovery phase. Often, organizations realize their backups have been infected as well as their primary system. This results in essentially reloading the ransomware or malware and starting all over in your recovery.

3-2-1 Backup Strategy

Organizations should be implementing the 3-2-1 backup strategy which means having three copies of each backup (one primary and two copies). Copies should be stored on two (2) different types of media (e.g., backup device, disk, removable hard drive, cloud, etc.). Finally, one copy should be maintained off-site and be immutable (cannot be changed) and segregated from the production network (either logically or physically – often referred to as “air-gapped”).

To ensure the ability to restore your backups, you should be restoring backups at least semi-annually (but ideally more frequently), to ensure your systems and data can in fact, be restored.

The next article will discuss the fifth and final phase of an incident response plan, Post Incident Activity: Lessons Learned.

If you would like to discuss incident response planning in more detail, reach out to Tom Skoog, Cybersecurity and Data Management Practice Leader at tskoog@blueandco.com.

2023 E/M Coding Changes You Need to Know from the Physician Fee Schedule Final Ruling

New rules for reporting evaluation and management (E/M) services in most places of service took effect January 1, 2023. The coding and documentation revisions, adopted by the American Medical Association’s CPT Editorial Panel and approved by the Centers for Medicare and Medicaid Services (CMS), substantially simplify code selection and documentation. Effective January 1st, E/M services […]

Learn More

Consolidated Appropriations Act of 2023 Changes Impacting Rural Health Clinics

The Consolidated Appropriations Act of 2023, also known as the “Omnibus” package, was signed into law by President Biden on December 29, 2022. Rural Health Clinics (RHCs) need to be aware of some of the changes that will impact them including new grant opportunities and behavioral health provisions. Opportunities for Rural Health Clinics from the […]

Learn More
someone handing car keys to another person personal use of auto

The Importance of Personal vs. Business Use of Auto

By Pam Swartout, Manager and Jacoby Shade, Staff Accountant at Blue & Co. Many business owners provide a company vehicle to their employees as part of their employment. This is a company benefit that has tax implications and is extremely important for both the employer and employee to understand these implications. Employers can deduct only […]

Learn More