all-in-one privacy solution":["Proton Unlimited è una soluzione completa per la privacy"],"Black Friday":["Black Friday"],"No ads. Privacy by default.":["Niente pubblicità. La prima regola è la privacy."],"People before profits":["Le persone prima dei profitti"],"Security through transparency":["Più sicurezza grazie alla trasparenza"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["Le migliori offerte di Proton Mail per il ${ BLACK_FRIDAY }"],"The world’s only community- supported email service":["L'unico servizio di email al mondo supportato dalla community"]},"specialoffer:limited":{"${ hours } hour":["${ hours } ora","${ hours } ore"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["Restano ${ hoursLeft }, ${ minutesLeft } e ${ secondsLeft }"],"${ minutes } minute":["${ minutes } minuto","${ minutes } minuti"],"${ seconds } second":["${ seconds } secondo","${ seconds } secondi"],"Limited time offer":["Offerta a tempo limitato"]},"specialoffer:listitem":{"Create multiple addresses":["Crea indirizzi multipli"],"Hide-my-email aliases":["Alias hide-my-email"],"Quickly unsubscribe from newsletters":["Annulla rapidamente l'iscrizione alle newsletter"],"Use your own domain name":["Utilizza il tuo nome di dominio"]},"specialoffer:logos":{"As featured in":["Ne hanno parlato"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Scegli un'email cifrata per proteggere la tua privacy"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Offerta Black Friday di Proton Mail - sconti fino al 40%"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Per questo Black Friday ti offriamo fino al 40% di sconto sugli abbonamenti a Proton Mail. Scopri le straordinarie offerte sui piani di abbonamento alla nostra email dotata di crittografia end-to-end."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["Offerta di Proton Mail per il Black Friday | Fino al 40% di sconto sulla nostra email sicura"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["* Addebito di ${ TOTAL_SUM } per il primo anno"],"*Billed at ${ TOTAL_SUM } for the first 2 years":["*Addebito di ${ TOTAL_SUM } per i primi 2 anni"],"30-day money-back guarantee":["Garanzia soddisfatti o rimborsati di 30 giorni"],"Billed at ${ TOTAL_SUM } for the first 2 years":["Addebito di ${ TOTAL_SUM } per i primi 2 anni"],"Billed at ${ TOTAL_SUM } for the first year":["Addebito di ${ TOTAL_SUM } per il primo anno"],"You save ${ SAVE_SUM }":["Risparmi ${ SAVE_SUM }"]},"specialoffer:off":{"${ PERCENT_OFF } off":["−${ PERCENT_OFF }"]},"specialoffer:testimonial":{"I love my ProtonMail":["Adoro ProtonMail"],"My favorite email service":["Il mio servizio email preferito"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Grazie Proton perché ci proteggi nell'universo complicato di internet."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Ottieni quello per cui hai pagato. Nel caso di big tech, se non paghi niente, vieni usato. Ho smesso di usare Gmail e sono passata a @ProtonMail"]},"specialoffer:time":{"Days":["Giorni"],"Hours":["Ore"],"Min":["Min"]},"specialoffer:title":{"And much more":["E altro ancora"],"Safe from trackers":["Protezione dai tracker"],"Stay organized":["Tieni tutto in ordine"],"Black Friday email deals":["Offerte email del Black Friday"],"Don’t just take our word for it":["Non lo diciamo solo noi"],"Make your inbox yours":["Rendi la tua posta in arrivo davvero tua"],"Our story":["La nostra storia"],"Transfer your data from Google in one click":["Trasferisci i tuoi dati da Google con un solo clic"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_VPN_SERVERS }+ servers in ${ TOTAL_VPN_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Accedi a contenuti bloccati e naviga in modalità privata. Include oltre ${ TOTAL_VPN_SERVERS } server in più di ${ TOTAL_VPN_COUNTRIES } Paesi, possibilità di connettere fino a 10 dispositivi, accesso a servizi di streaming in tutto il mondo, anti-malware, ad-blocker e altro ancora."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Condividi facilmente il tuo calendario con familiari, amici o colleghi e visualizza calendari esterni."],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["Include il supporto per 1 dominio email personalizzato, 10 indirizzi email, 10 alias hide-my-email, condivisione del calendario e altro ancora."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["Include il supporto per 3 domini email personalizzati, 15 indirizzi email, alias hide-my-email illimitati, condivisione del calendario e altro ancora."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["Gestisci fino a 25 calendari, app per dispositivi mobili, protezione con la crittografia end-to-end, importazione del calendario da Google in un solo clic e altro ancora."]},"Status banner":{"Learn more":["Scopri di più"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["Attenzione: stiamo riscontrando dei problemi con il servizio di ${ issues[0] }"],"We are experiencing issues with one or more services at the moment.":["Stiamo riscontrando dei problemi con uno o più servizi."]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["Al momento abbiamo dei problemi con il servizio di Proton VPN"],"Learn more":["Scopri di più"]},"steps":{"Step":["Passaggio"]},"suggestions":{"Suggestions":["Suggerimenti"]},"Support":{"Sub category":["Sottocategoria","Sottocategorie"]},"Support article":{"${ readingTime } min":["${ readingTime } minuto","${ readingTime } minuti"],"Category":["Categoria","Categorie"],"Didn’t find what you were looking for?":["Non hai trovato quello che cercavi?"],"General contact":["Contatti generali"],"Get help":["Ottieni supporto"],"Legal contact":["Contatti legali"],"Media contact":["Contatti per la stampa"],"Partnerships contact":["Contatti per collaborazioni"],"Reading":["Lettura"]},"Support Form Platform option":{"VPN for Android TV":["VPN per Android TV"],"VPN for Apple TV":["VPN per Apple TV"],"VPN for Chromebook":["VPN per Chromebook"]},"Support troubleshooting":{"App version":["Versione dell'app"],"Browser":["Browser"],"Check if this helps":["Verifica se questo ti è utile"],"Choose a product":["Scegli un prodotto"],"Did this solve your issue?":["Ha risolto il tuo problema?"],"Faster assistance is just a few clicks away":["Ottieni assistenza più velocemente con pochi clic"],"How can we help?":["Come possiamo aiutarti?"],"No, contact support":["No, contatta il supporto"],"Please fill out one field after another":["Compila un campo dopo l'altro"],"Please make your selections":["Fai la tua selezione"],"Proton account":["Account Proton"],"Proton for Business":["Proton for Business"],"Thank you for your feedback":["Grazie per il feedback"],"What can we help with?":["In cosa possiamo esserti di aiuto?"],"Yes":["Sì"]},"support_modal_search_query":{"Search query":["Query di ricerca"]},"support_search_button":{"Search":["Cerca"]},"support_search_i_am_looking_for":{"I'm looking for":["Sto cercando"]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["Per una risoluzione più rapida, segnala il problema dall'app Bridge: Aiuto > Segnala un problema."],"Information":["Informazioni"]},"SupportForm:option":{"Account Security":["Sicurezza dell'account"],"Contacts":["Contatti"],"Custom email domain":["Dominio email personalizzato"],"Email delivery and Spam":["Consegna delle email e spam"],"Encryption":["Crittografia"],"Login and password":["Login e password"],"Merge aliases and accounts":["Unione di alias e account"],"Migrate to Proton":["Migrazione a Proton"],"Notifications":["Notifiche"],"Other":["Altro"],"Plans and billing":["Piani e fatturazione"],"Proton for Business":["Proton for Business"],"Sign up":["Iscrizione"],"Storage":["Archiviazione"],"Users, addresses, and identities":["Utenti, indirizzi e identità"]},"SupportForm:optionIntro":{"Select a topic":["Seleziona un argomento"]},"Testimonial":{"Awards":["Premi"],"Customers":["Clienti"],"Featured":["In evidenza"],"Go to testimonial source":["Vai alle testimonianze"],"Open source of award":["Apri la fonte del premio"],"Open source of quote":["Apri la fonte della citazione"],"Reviews":["Recensioni"],"Videos":["Video"],"Watch on TikTok":["Guarda su TikTok"],"Watch on YouTube":["Guarda su YouTube"]},"TestimonialCategory":{"Awards":["Premi"],"Customers":["Clienti"],"Featured":["In evidenza"],"Media":["Media"],"Reviews":["Recensioni"],"Videos":["Video"]},"Text":{"If you need help, check out our ${ supportLink }.":["Se ti serve assistenza dai un’occhiata alla nostra ${ supportLink }."],"The page you’re looking for might have been removed, or it could be an\nold link.":["La pagina che stai cercando potrebbe essere stata rimossa, o il link potrebbe essere vecchio."],"Your question may already have an answer in our knowledge base:":["La risposta alla tua domanda potrebbe essere già disponibile nella nostra base di conoscenza:"]},"Title":{"On this page":["In questa pagina"],"Related articles":["Articoli correlati"],"Share ${ thisPage }":["Condividi ${ thisPage }"],"Switch to Proton Pass - Contact us":["Passa a Proton Pass - Contattaci"],"Thank you!":["Grazie"],"this page":["questa pagina"]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_VPN_SERVERS }+ servers in ${ TOTAL_VPN_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Accedi a contenuti bloccati e naviga in modalità privata. Include oltre ${ TOTAL_VPN_SERVERS } server in più di ${ TOTAL_VPN_COUNTRIES } Paesi, VPN ad altissima velocità, ${ TOTAL_VPN_CONNECTIONS } connessioni VPN, servizi di streaming in tutto il mondo, anti-malware, ad-blocker e altro ancora."]},"vpn_servers":{"Get Proton VPN Plus":["Scegli Proton VPN Plus"]},"wallet_signup_2024:Action":{"Get Proton Wallet":["Ottieni Proton Wallet"]},"wallet_signup_2024:Homepage hero product link title":{"Wallet":["Wallet"]},"wallet_signup_2024:Homepage product navigation bar":{"Wallet":["Wallet"]},"wallet_signup_2024:menu item":{"Bitcoin guide":["Guida Bitcoin"],"Proton Wallet news":["Novità di Proton Wallet"],"Proton Wallet support":["Supporto di Proton Wallet"]},"wallet_signup_2024:Pricing":{"Includes everything in Proton Unlimited and":["Include tutte le funzionalità di Proton Unlimited e"],"Limited availability":["Disponibilità limitata"],"The easiest way to securely own, send, and receive Bitcoin":["Il modo più semplice di possedere, inviare e ricevere Bitcoin in modo sicuro"]},"wallet_signup_2024:ProductRange":{"Discover Proton Wallet":["Scopri Proton Wallet"],"Store and transact Bitcoin privately with an encrypted self-custody wallet.":["Conserva ed esegui transazioni in Bitcoin in modo privato con un portafoglio a custodia autonoma crittografato."]},"wallet_signup_2024:wallet bitcoin":{"Learn about Bitcoin, the Internet's value network.":["Scopri il Bitcoin, la rete di valore di Internet."]},"wallet_signup_2024:wallet overview":{"Ensure you're always in control of your Bitcoin.":["Assicurati di avere sempre il controllo dei tuoi Bitcoin."]},"wallet_signup_2024:wallet security":{"The encrypted, open-source wallet that puts you in control.":["Il portafoglio crittografato e open source che ti dà il controllo."]}}},"base":"blog","cdn":{"enabledForAssets":true,"enabledForImages":true,"url":"https://pmecdn.protonweb.com/"},"unleashApi":"https://account.proton.me/api"};
window.frameworkContext = frameworkContext;
const context = frameworkContext.base === '' ? '' : `${frameworkContext.base}/`;
window.__toAssetUrl = (filename) => {
if (frameworkContext.cdn !== undefined && frameworkContext.cdn.enabledForAssets === true) {
return `${frameworkContext.cdn.url}${context}${filename}`;
} else {
return `/${context}${filename}`;
}
};
})();
Cybersecurity incident response: Is your business prepared? | Proton
A cybersecurity attack threatens your business’s data, IT systems, and finances. To avoid or mitigate these attacks, you need to create an incident response. In this article, we’ll explain what incident response is, how to put together a plan, and how to increase your chance of avoiding attacks in the first place.
What does incident response mean in cybersecurity?
Incident response refers to the way a company responds to a cyberthreat such as phishing, man-in-the-middle, or malware(nuova finestra) within their network. An incident response plan identifies all of the potential threats and vulnerabilities within your business with a risk assessment, and then defines the actions your business will make if it’s affected by threats.
When a threat or potential breach is detected, your plan lays out the approach you’ll take to responding: this includes actions such as mass password resets, network recovery, data backup, and notifying governmental agencies or customers as needed.
What is a cybersecurity incident?
In recent years, cybercrime has increased. Hackers rely on tools such as ransomware(nuova finestra) to gain access to businesses’ infrastructure and then extort money in return for regaining access. A recent example of this is Casio, the international electronics manufacturer, which announced the impact of a third party ransomware attack(nuova finestra) on its website.
According to TechCrunch, a ransomware group named Underground(nuova finestra) has since announced it was responsible for the attack, accessing and downloading more than 200GB of data. The data included employees’ personal information, customers’ personal information, and business partners’ personal information.
Casio is still investigating the scope of the damage caused, and has not specified whether it paid a ransom amount to Underground. Incidents of this nature have been on the rise due to the lucrative nature of ransomware, and they’re likely to increase.
Why do you need an incident response plan?
According to research from the Identity Theft Resource Center, businesses in the financial services, healthcare, professional services, manufacturing, and education industries were the most compromised in H1 of 2024(nuova finestra). In the same time period, cyberattacks led to 1,226 breaches, affecting more than 1 million victims.
The risks associated with falling victim to a cyberattack include financial loss, regulatory fines, and loss of reputation: having an incident response plan helps a business avoid or minimize being affected by this fallout. In the event of a cybersecurity attack, all employees understand who’s in charge of the incident response and what their role is in your plan.
Globally, governments are beginning to understand the necessity of proper incident reporting and response. In the US, federal and state laws are able to impose cybersecurity requirements(nuova finestra) such as documenting cybersecurity risks, writing incident response plans, annual risk assessments, and pen testing. If a business fails to meet the regulations dictated by its local requirements, the FTC can seek financial penalties.
In the UK in 2025, the Cyber Security and Resilience Bill(nuova finestra) will be introduced to parliament. The UK government reasons that “recent serious high-profile attacks impacting London hospitals and the Ministry of Defence, as well as ransom attacks on the British Library and Royal Mail, have highlighted that our services and institutions are vulnerable to attack.” An incident response plan may in fact be a legal requirement for businesses around the world in the future.
How to put together a cybersecurity incident response plan
If you don’t have an incident response plan, we’re going to help you understand how to put one together. Below are some of the key aspects of your plan you’ll need to consider.
Appoint an incident response team
The team who will carry out your plan won’t all be cybersecurity experts – instead, they’ll be key figures from different areas of your business who can coordinate a cross-functional approach. They’ll also feed information back to the incident response manager and share information with other employees as needed.
As well as including any IT admins, your incident response team should include employees in your HR, customer service, and legal teams. A data breach will affect your employees and your customers, as well as potentially having legal ramifications: the teams handling these business areas need to be part of your response team.
Proactive v.s. reactive incident response
A reactive incident response plan involves reacting to an event that is already happening. Typically, it will involve locating the source of the threat, isolating it to prevent any further breach of your systems, and working to remove the threat.
A proactive incident response involves actively preventing events from happening. It involves mapping out your system architecture to identify vulnerabilities, educating employees about cybersecurity, and putting safeguards in place to prevent breaches.
When you’re creating your incident response plan, use a combination of reactive and proactive methods. Help your incident response team prevent breaches with ongoing system monitoring and logging, and manage any events with effective identity management tools. Help your employees prevent breaches occurring with two-factor authentication (2FA) and secure passwords, and help them react to breaches with a clear plan on how to escalate an incident to your dedicated incident response team.
Think before and after a cyber incident
Your plan will determine how you respond to a cyber incident, but it will also determine how you monitor for and prevent incidents before they happen.
Before an incident: Identify your business’s most sensitive and valuable assets, and create a map of all your data. Name the person / people in charge of the recovery as incident managers. Make sure that you have scrupulous auditing and logging to identify the origin of any potential threats. Educate employees about safe password practices, giving them the right password management tools to manage their logins and enforcing 2FA.
During an incident: Isolate the threat and neutralize any potential for it to spread – reset user logins, take sensitive data offline, and isolate affected tools and systems. When the threat is contained, work to remove it with your appointed incident response team.
After an incident: Create a detailed timeline of the incident and identify business areas and areas of your incident response plan which need to be strengthened to prevent a similar threat in future.
The right tools for cybersecurity incident response
Cybersecurity isn’t the sole responsibility of IT admins: it takes every employee within a business to keep your data safe. Stolen employee credentials can be used to access your IT infrastructure, so using a password manager is one of the easiest steps you can take to prevent cyber incidents occurring.
Proton Pass for Business helps every employee within a business safely store, autofill, and share passwords to their work tools. Using the built-in password generator, employees can create unique passwords for every platform they use. Admins can track password changes and user activity through the activity logs, and enforce 2FA for every user. Team policies ensure that sharing data outside your business is switched off, preventing sensitive data leaks.
If you’re ready to create your incident response plan, start by giving your employees the tools to protect themselves and your business from hackers. They’ll become an essential part of your plan with the right tools – find out more about Proton Pass for Business.