Email Security Blog

After a Data Breach: Why The End Of The World Is Just The Beginning

Agari September 1, 2015 Cybercrime
Fallback Featured Image

It’s no secret that data breaches can occur at any time and are becoming increasingly commonplace. In 2014, 43% of companies experienced at least one breach effecting more than 1,000 customer data records (Ponemon Institute, Sept. 2014). If the unthinkable happens and a customer data breach occurs, does your company have a comprehensive and effective response plan in place? This was the key question coming out of the latest Agari webinar, “The End of the World is Just the Beginning“. How successful a company is in responding to a breach can make all the difference in maintaining customer trust.

Although 73% of companies say they have a breach response plan in place, only 1/3 of them actually believe in the effectiveness of their own plan (Ponemon Institute, Sept. 2014). Because many companies admittedly haven’t planned well, they may not know how to successfully prevent negative opinion, perform end to end testing or keep their response plan updated. When a breach occurs, the response plan is the key resource for protecting the brand, the customers and ensuring the highest, most effective level of “damage control”.

The most critical aspect of the plan is customer communication. Knowing how to securely and confidently alert customers in the event of a breach, and share details about how it’s being handled and what they should do, helps prevent the spread of panic and negative opinion. How should companies securely integrate email into their breach response? Taking a few simple, practical steps will help establish secure customer email communication for when it’s needed most. Here are 5 key takeaways:

  • Use one, easy to remember email address with primary brand name
  • Turn on DMARC to secure the email channel in advance and achieve greater visibility
  • Distinguish messaging on secure vs. unsecured email addresses
  • Preemptively communicate the plan across web, media and social platforms
  • Test the plan end to end and inform customers of what to expect

Companies need to act now and secure their email channel so that it can play a major role in their overall breach response plan. By proactively securing their email communication, companies can take major strides in controlling the flow of information after a breach and ensure that their customers receive timely and trusted notifications. Considering the far reaching and lasting fallout that often occurs from any type of security breach, having a reliable response plan in place has never been more crucial.

At Agari, we believe your brand and your reputation should always be under your control. Let Agari help as you develop your data breach response plan. We’ve already partnered with some of the world’s biggest brands to secure their email channels, enhancing the trust their customers place in them.

See the webinar here


Leave a Reply

Your email will not be published. All fields are required.

Agari Blog Image

April 25, 2019 Crane Hassold

Bitcoin: The Next Evolution in BEC Cash Out Methods?

Historically, business email compromise (BEC) threat actors have used wire transfers as a means to…

Agari Blog Image

April 18, 2019 Ronnie Tokazowski

Do You Know Where Your W-2 Is? Probably Where You Left It

It’s like clockwork. Every year around tax time security vendors (even us!) push out warnings…

Agari Blog Image

April 4, 2019 Crane Hassold

Evolving Tactics: London Blue Starts Spoofing Target Domains

In December, the Agari Cyber Intelligence Division (ACID) published a report on a business email…

Agari Blog Image

March 27, 2019 Ronnie Tokazowski

Why iTunes? A Look into Gift Cards as an Emerging BEC Cash Out Method

One of the trends that has been slowly creeping up across the BEC threat landscape…

Checking Email on Phone

March 19, 2019 James Linton

BEC Goes Mobile as Cybercriminals Turn to SMS

Business email compromise (BEC) is a term that encompasses a variety of techniques and tactics…

mobile image