Steps to Follow in Case of a Suspected Breach
Table of Contents
PURPOSE
Establish a clear and effective response procedure in the event of a suspected or confirmed breach. This ensures the protection of sensitive information, and minimizes the impact of the breach.
SCOPE
This article applies to all employees, contractors, and third-party service providers who have access to the organization's systems, networks, or data. It covers all types of data breaches, including but not limited to unauthorized data access, data theft, and accidental disclosure of confidential information.
RESPONSIBILITIES
Employees:
- Immediately report any suspected data breach to ALPHA at 778-441-2535.
- Follow the breach response procedures as outlined in this document.
ALPHA:
- Conduct initial investigations into suspected breaches to assess the scope and impact.
- Implement possible measures to contain and mitigate the breach.
DEFINITIONS
-
Breach: A security incident where information is accessed without authorization.
-
Sensitive Information: Data that, if disclosed, could result in harm to the organization or individuals, including personal identification numbers, financial data, or proprietary business information.
-
Two-Factor Authentication (2FA): An additional layer of security requiring not only a password and username but also something that only the user has on them, i.e., a piece of information only they should know or have immediately to hand.
- Cybersecurity Professional: An expert who specializes in protecting systems, networks, and programs from digital attacks.
PROCEDURE
If you suspect that your personal or company data has been compromised, it is crucial to take immediate action to secure your information and notify ALPHA. Please follow the steps outlined below:
Step 1: Asses the Situation
Responsibilities: Customer
- Document any unusual activities or signs that led you to suspect a breach, such as unfamiliar account transactions, login attempts, or unauthorized access notifications.
Step 2: Immediate Actions
Responsibilities: Customer
- Disconnect any affected devices from the internet to prevent further unauthorized access or data transmission.
- Avoid using compromised accounts or devices until they have been secured.
Step 3: Contact ALPHA
Responsibilities: Customer
- Immediately contact ALPHA via the main phone line at 778-441-2535 to report the suspected breach.
- Provide them with as much information as possible regarding the incident, including the time, date, and nature of the suspicious activity.
Step 4: Follow ALPHA's Guidance
Responsibilities: Customer
- Follow any instructions or recommendations provided by ALPHA to help secure your accounts and devices. These might include:
- Change Passwords
- Enable Two-Factor Authentication (if available)
- Provide any additional information or documentation they might request to assist in their investigation.
By following these steps, you can help mitigate the impact of a breach and protect your sensitive information. Remember, swift action is critical in preventing further damage.