1. Stop the attack and minimize damage
The first step is to immediately check which systems are affected and isolate them from the network. The goal is to prevent further damage. Systems that are not immediately affected should be monitored to detect possible hidden backdoors.
2. Investigation of the incident
Cybersecurity experts should be called in to analyze the attack in detail, determining the chronology, cause and extent of the attack. In particular, it must be checked whether and how much personal data is affected.
3. Assess the risk to affected persons
The information collected is used to analyse the risk to those affected. Both the severity and the likelihood of possible damage play a role. Damage can include identity theft, damage to reputation or economic disadvantages.
4. Damage limitation measures
Mitigating potential impacts includes regularly restoring data and services and checking the data for unauthorized changes. The LDI NRW (State Commissioner for Data Protection and Freedom of Information North Rhine-Westphalia) generally considers it sensible to inform affected persons about the attack - even if there is no obligation to do so under the GDPR.
5. Long-term security measures
After an attack, the security level must be adjusted. This includes installing updates, regular checks and implementing secure authentication procedures such as multi-factor authentication