all-in-one privacy solution":["Proton Unlimited é uma solução única de privacidade"],"Black Friday":["Black Friday"],"No ads. Privacy by default.":["Sem anúncios. Privacidade por padrão."],"People before profits":["Pessoas acima do lucro"],"Security through transparency":["Segurança por meio da transparência"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["As melhores ofertas de ${ BLACK_FRIDAY } do Proton Mail"],"The world’s only community- supported email service":["O único serviço de e-mail do mundo apoiado pela comunidade"]},"specialoffer:limited":{"${ hours } hour":["${ hours } hora","${ hours } horas"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["${ hoursLeft }, ${ minutesLeft }, e ${ secondsLeft } restantes"],"${ minutes } minute":["${ minutes } minuto","${ minutes } minutos"],"${ seconds } second":["${ seconds } segundo","${ seconds } segundos"],"Limited time offer":["Oferta por tempo limitado"]},"specialoffer:listitem":{"Create multiple addresses":["Crie vários endereços"],"Hide-my-email aliases":["Use aliases do hide-my-email"],"Quickly unsubscribe from newsletters":["Cancele a assinatura de newsletters rapidamente"],"Use your own domain name":["Use seu próprio nome de domínio"]},"specialoffer:logos":{"As featured in":["Destaques"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Obtenha um e-mail criptografado que proteja sua privacidade"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Oferta de Black Friday do Proton Mail - Até 40% de desconto"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Obtenha até 40% de desconto nas assinaturas do Proton Mail nesta Black Friday. Confira ótimas ofertas em nossos planos de e-mail seguro com criptografia de ponta a ponta."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["Oferta de Black Friday do Proton Mail - Até 40% de desconto no e-mail protegido"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["* Com o preço de ${ TOTAL_SUM } no primeiro ano"],"*Billed at ${ TOTAL_SUM } for the first 2 years":["*Com o preço de ${ TOTAL_SUM } nos primeiros dois anos"],"30-day money-back guarantee":["Garantia de reembolso de 30 dias"],"Billed at ${ TOTAL_SUM } for the first 2 years":["Com o preço de ${ TOTAL_SUM } nos primeiros dois anos"],"Billed at ${ TOTAL_SUM } for the first year":["Com o preço de ${ TOTAL_SUM } no primeiro ano"],"You save ${ SAVE_SUM }":["Economize ${ SAVE_SUM }"]},"specialoffer:off":{"${ PERCENT_OFF } off":["-${ PERCENT_OFF }"]},"specialoffer:testimonial":{"I love my ProtonMail":["Adoro ProtonMail"],"My favorite email service":["Meu serviço favorito de e-mail"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Agradecemos ao Proton por nos manter a salvo no complicado universo da internet."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Você recebe pelo que paga. No caso das grandes tecnologias, você se acostuma quando não paga nada. Parei de usar o Gmail e troquei para o @ProtonMail"]},"specialoffer:time":{"Days":["Dias"],"Hours":["Horas"],"Min":["Min"]},"specialoffer:title":{"And much more":["E muito mais"],"Safe from trackers":["A salvo de rastreadores"],"Stay organized":["Mantenha tudo organizado"],"Black Friday email deals":["Ofertas de e-mail da Black Friday"],"Don’t just take our word for it":["Não confie apenas em nossa palavra"],"Make your inbox yours":["Deixe sua caixa de entrada do seu jeito"],"Our story":["Nossa história"],"Transfer your data from Google in one click":["Transfira seus dados do Google com um clique"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_VPN_SERVERS }+ servers in ${ TOTAL_VPN_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Acesse conteúdo bloqueado e navegue com privacidade. Inclui mais de ${ TOTAL_VPN_SERVERS } servidores em mais de ${ TOTAL_VPN_COUNTRIES } países, conexão com até 10 dispositivos, acesso a serviços de streaming do mundo todo, um bloqueador de anúncios e malware e muito mais."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Compartilhe facilmente seus calendários com amigos, familiares ou colegas e visualize calendários externos."],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["Inclui suporte para 1 domínio de e-mail personalizado, 10 endereços de e-mail, 10 aliases do hide-my-email, compartilhamento de calendário e muito mais."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["Inclui suporte para 3 domínios de e-mail personalizados, 15 endereços de e-mail, aliases ilimitados do hide-my-email, compartilhamento de calendário e muito mais."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["Gerencie até 25 calendários, apps para dispositivos móveis, protegidos com criptografia de ponta a ponta, importação de calendário com 1 clique do Google e muito mais."]},"Status banner":{"Learn more":["Saiba mais"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["No momento, estamos com problemas no serviço ${ issues[0] }."],"We are experiencing issues with one or more services at the moment.":["No momento, estamos com problemas em um ou mais serviços."]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["No momento estamos enfrentando problemas com o serviço Proton VPN"],"Learn more":["Saiba mais"]},"steps":{"Step":["Etapa"]},"suggestions":{"Suggestions":["Sugestões"]},"Support":{"Sub category":["Subcategoria","Subcategorias"]},"Support article":{"${ readingTime } min":["${ readingTime } min","${ readingTime } min"],"Category":["Categoria","Categorias"],"Didn’t find what you were looking for?":["Não encontrou o que procura?"],"General contact":["Contato geral"],"Get help":["Obter ajuda"],"Legal contact":["Contato jurídico"],"Media contact":["Contato de mídia"],"Partnerships contact":["Contato de parcerias"],"Reading":["Leitura"]},"Support Form Platform option":{"VPN for Android TV":["VPN para Android TV"],"VPN for Apple TV":["VPN para Apple TV"],"VPN for Chromebook":["VPN para Chromebook"]},"Support troubleshooting":{"App version":["Versão do aplicativo"],"Browser":["Navegador"],"Check if this helps":["Confira se isso ajuda"],"Choose a product":["Selecione um produto"],"Did this solve your issue?":["Isso resolveu seu problema?"],"Faster assistance is just a few clicks away":["Assistência mais rápida a apenas alguns cliques de distância"],"How can we help?":["Como podemos ajudar?"],"No, contact support":["Não, entrar em contato com o suporte"],"Please fill out one field after another":["Preencha os campos em sequência"],"Please make your selections":["Faça suas seleções"],"Proton account":["Conta Proton"],"Proton for Business":["Proton for Business"],"Thank you for your feedback":["Agradecemos pelo feedback"],"What can we help with?":["Com o que podemos ajudar?"],"Yes":["Sim"]},"support_modal_search_query":{"Search query":["Consulta de pesquisa"]},"support_search_button":{"Search":["Pesquisar"]},"support_search_i_am_looking_for":{"I'm looking for":["Estou procurando"]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["Para uma resolução mais rápida, informe o problema no aplicativo Bridge: Ajuda > Comunicar um problema."],"Information":["Informações"]},"SupportForm:option":{"Account Security":["Segurança da conta"],"Contacts":["Contatos"],"Custom email domain":["Domínio de e-mail personalizado"],"Email delivery and Spam":["Entrega de e-mail e spam"],"Encryption":["Criptografia"],"Login and password":["Início de sessão e senha"],"Merge aliases and accounts":["Combinar alias e contas"],"Migrate to Proton":["Migrar para a Proton"],"Notifications":["Notificações"],"Other":["Outros"],"Plans and billing":["Planos e faturamento"],"Proton for Business":["Proton for Business"],"Sign up":["Criar conta"],"Storage":["Armazenamento"],"Users, addresses, and identities":["Usuários, endereços e identidades"]},"SupportForm:optionIntro":{"Select a topic":["Selecione um tópico"]},"Testimonial":{"Awards":["Prêmios"],"Customers":["Clientes"],"Featured":["Em destaque"],"Go to testimonial source":["Ir para a página inicial de depoimentos"],"Open source of award":["Abrir origem do prêmio"],"Open source of quote":["Abrir origem da citação"],"Reviews":["Avaliações"],"Videos":["Vídeos"],"Watch on TikTok":["Assistir no TikTok"],"Watch on YouTube":["Assistir no Youtube"]},"TestimonialCategory":{"Awards":["Prêmios"],"Customers":["Clientes"],"Featured":["Em destaque"],"Media":["Mídia"],"Reviews":["Avaliações"],"Videos":["Vídeos"]},"Text":{"If you need help, check out our ${ supportLink }.":["Se precisar de ajuda, confira nossa ${ supportLink }."],"The page you’re looking for might have been removed, or it could be an\nold link.":["É possível que a página que você está procurando tenha sido removida ou seja um\nlink antigo."],"Your question may already have an answer in our knowledge base:":["Talvez sua pergunta já tenha sido respondida em nossa base de conhecimento:"]},"Title":{"On this page":["Nesta página"],"Related articles":["Artigos relacionados"],"Share ${ thisPage }":["Compartilhar ${ thisPage }"],"Switch to Proton Pass - Contact us":["Mudar para o Proton Pass – Fale conosco"],"Thank you!":["Obrigado!"],"this page":["esta página"]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_VPN_SERVERS }+ servers in ${ TOTAL_VPN_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Acesse conteúdo bloqueado e navegue com privacidade. Inclui mais de ${ TOTAL_VPN_SERVERS } servidores em mais de ${ TOTAL_VPN_COUNTRIES } países, a maior velocidade de VPN, ${ TOTAL_VPN_CONNECTIONS } conexões VPN, serviços de streaming do mundo todo, bloqueador de anúncios e malware e muito mais."]},"vpn_servers":{"Get Proton VPN Plus":["Obter Proton VPN Plus"]},"wallet_signup_2024:Action":{"Get Proton Wallet":["Obtenha o Proton Wallet"]},"wallet_signup_2024:Homepage hero product link title":{"Wallet":["Wallet"]},"wallet_signup_2024:Homepage product navigation bar":{"Wallet":["Wallet"]},"wallet_signup_2024:menu item":{"Bitcoin guide":["Guia sobre bitcoins"],"Proton Wallet news":["Novidades do Proton Wallet"],"Proton Wallet support":["Suporte do Proton Wallet"]},"wallet_signup_2024:Pricing":{"Includes everything in Proton Unlimited and":["Inclui todos os recursos do Proton Unlimited e"],"Limited availability":["Disponibilidade limitada"],"The easiest way to securely own, send, and receive Bitcoin":["A maneira mais fácil de guardar, enviar e receber bitcoins com segurança"]},"wallet_signup_2024:ProductRange":{"Discover Proton Wallet":["Conheça o Proton Wallet"],"Store and transact Bitcoin privately with an encrypted self-custody wallet.":["Guarde e negocie bitcoins de modo privado usando uma carteira com autocustódia criptografada."]},"wallet_signup_2024:wallet bitcoin":{"Learn about Bitcoin, the Internet's value network.":["Saiba mais sobre bitcoins, a rede de valor da internet."]},"wallet_signup_2024:wallet overview":{"Ensure you're always in control of your Bitcoin.":["Tenha certeza de ter sempre o controle das suas bitcoins."]},"wallet_signup_2024:wallet security":{"The encrypted, open-source wallet that puts you in control.":["A carteira criptografada e de código aberto que coloca você no controle."]}}},"base":"blog","cdn":{"enabledForAssets":true,"enabledForImages":true,"url":"https://pmecdn.protonweb.com/"},"unleashApi":"https://account.proton.me/api"};
window.frameworkContext = frameworkContext;
const context = frameworkContext.base === '' ? '' : `${frameworkContext.base}/`;
window.__toAssetUrl = (filename) => {
if (frameworkContext.cdn !== undefined && frameworkContext.cdn.enabledForAssets === true) {
return `${frameworkContext.cdn.url}${context}${filename}`;
} else {
return `/${context}${filename}`;
}
};
})();
Cybersecurity incident response: Is your business prepared? | Proton
A cybersecurity attack threatens your business’s data, IT systems, and finances. To avoid or mitigate these attacks, you need to create an incident response. In this article, we’ll explain what incident response is, how to put together a plan, and how to increase your chance of avoiding attacks in the first place.
What does incident response mean in cybersecurity?
Incident response refers to the way a company responds to a cyberthreat such as phishing, man-in-the-middle, or malware(nova janela) within their network. An incident response plan identifies all of the potential threats and vulnerabilities within your business with a risk assessment, and then defines the actions your business will make if it’s affected by threats.
When a threat or potential breach is detected, your plan lays out the approach you’ll take to responding: this includes actions such as mass password resets, network recovery, data backup, and notifying governmental agencies or customers as needed.
What is a cybersecurity incident?
In recent years, cybercrime has increased. Hackers rely on tools such as ransomware(nova janela) to gain access to businesses’ infrastructure and then extort money in return for regaining access. A recent example of this is Casio, the international electronics manufacturer, which announced the impact of a third party ransomware attack(nova janela) on its website.
According to TechCrunch, a ransomware group named Underground(nova janela) has since announced it was responsible for the attack, accessing and downloading more than 200GB of data. The data included employees’ personal information, customers’ personal information, and business partners’ personal information.
Casio is still investigating the scope of the damage caused, and has not specified whether it paid a ransom amount to Underground. Incidents of this nature have been on the rise due to the lucrative nature of ransomware, and they’re likely to increase.
Why do you need an incident response plan?
According to research from the Identity Theft Resource Center, businesses in the financial services, healthcare, professional services, manufacturing, and education industries were the most compromised in H1 of 2024(nova janela). In the same time period, cyberattacks led to 1,226 breaches, affecting more than 1 million victims.
The risks associated with falling victim to a cyberattack include financial loss, regulatory fines, and loss of reputation: having an incident response plan helps a business avoid or minimize being affected by this fallout. In the event of a cybersecurity attack, all employees understand who’s in charge of the incident response and what their role is in your plan.
Globally, governments are beginning to understand the necessity of proper incident reporting and response. In the US, federal and state laws are able to impose cybersecurity requirements(nova janela) such as documenting cybersecurity risks, writing incident response plans, annual risk assessments, and pen testing. If a business fails to meet the regulations dictated by its local requirements, the FTC can seek financial penalties.
In the UK in 2025, the Cyber Security and Resilience Bill(nova janela) will be introduced to parliament. The UK government reasons that “recent serious high-profile attacks impacting London hospitals and the Ministry of Defence, as well as ransom attacks on the British Library and Royal Mail, have highlighted that our services and institutions are vulnerable to attack.” An incident response plan may in fact be a legal requirement for businesses around the world in the future.
How to put together a cybersecurity incident response plan
If you don’t have an incident response plan, we’re going to help you understand how to put one together. Below are some of the key aspects of your plan you’ll need to consider.
Appoint an incident response team
The team who will carry out your plan won’t all be cybersecurity experts – instead, they’ll be key figures from different areas of your business who can coordinate a cross-functional approach. They’ll also feed information back to the incident response manager and share information with other employees as needed.
As well as including any IT admins, your incident response team should include employees in your HR, customer service, and legal teams. A data breach will affect your employees and your customers, as well as potentially having legal ramifications: the teams handling these business areas need to be part of your response team.
Proactive v.s. reactive incident response
A reactive incident response plan involves reacting to an event that is already happening. Typically, it will involve locating the source of the threat, isolating it to prevent any further breach of your systems, and working to remove the threat.
A proactive incident response involves actively preventing events from happening. It involves mapping out your system architecture to identify vulnerabilities, educating employees about cybersecurity, and putting safeguards in place to prevent breaches.
When you’re creating your incident response plan, use a combination of reactive and proactive methods. Help your incident response team prevent breaches with ongoing system monitoring and logging, and manage any events with effective identity management tools. Help your employees prevent breaches occurring with two-factor authentication (2FA) and secure passwords, and help them react to breaches with a clear plan on how to escalate an incident to your dedicated incident response team.
Think before and after a cyber incident
Your plan will determine how you respond to a cyber incident, but it will also determine how you monitor for and prevent incidents before they happen.
Before an incident: Identify your business’s most sensitive and valuable assets, and create a map of all your data. Name the person / people in charge of the recovery as incident managers. Make sure that you have scrupulous auditing and logging to identify the origin of any potential threats. Educate employees about safe password practices, giving them the right password management tools to manage their logins and enforcing 2FA.
During an incident: Isolate the threat and neutralize any potential for it to spread – reset user logins, take sensitive data offline, and isolate affected tools and systems. When the threat is contained, work to remove it with your appointed incident response team.
After an incident: Create a detailed timeline of the incident and identify business areas and areas of your incident response plan which need to be strengthened to prevent a similar threat in future.
The right tools for cybersecurity incident response
Cybersecurity isn’t the sole responsibility of IT admins: it takes every employee within a business to keep your data safe. Stolen employee credentials can be used to access your IT infrastructure, so using a password manager is one of the easiest steps you can take to prevent cyber incidents occurring.
Proton Pass for Business helps every employee within a business safely store, autofill, and share passwords to their work tools. Using the built-in password generator, employees can create unique passwords for every platform they use. Admins can track password changes and user activity through the activity logs, and enforce 2FA for every user. Team policies ensure that sharing data outside your business is switched off, preventing sensitive data leaks.
If you’re ready to create your incident response plan, start by giving your employees the tools to protect themselves and your business from hackers. They’ll become an essential part of your plan with the right tools – find out more about Proton Pass for Business.