GrantThornton - regions

Security in business – learning the lesson

The noticeable rise in the number of incidents and attempted data breaches has led to an increased interest in security – especially in the face of the sudden changes in business procedures due to the coronavirus pandemic.  These changes have affected not only businesses, but also cybercriminals, who very quickly adapted to the new market reality.

Incident… and now what?

In our work, we often have various organizations come to us for help following an incident or data leak. Unfortunately, such situations are becoming more and more widespread, and even savvy users are affected. Phishing attacks and similar scams aimed at gaining access to confidential information are the most common challenges we have to deal with.

Analyse the situation and mitigate the consequences

The first step we take in these cases is to analyse the situation and take steps to minimise the negative impact of the incident and its scope. The key element at this stage is to devise a methodical approach tailored to the case at hand. As soon as we are confident that the incident is under control, we proceed simultaneously along two paths:

  • analysis of existing security mechanisms,
  • developing a remedial plan.

Such an approach enables us to identify potential gaps not only in the safeguards in place in the organization, but also in the processes initiated as a result of the adverse event. It is our job to carry out an in-depth analysis and evaluation of existing mechanisms and to recommend corrective action.

Ważny fragment

In our experience, even savvy organizations, which have implemented a range of security features, have vulnerabilities that seem negligible from their point of view, but when viewed from a different perspective – can generate high risks.

Conclusions and lessons for the future

The products delivered to our clients as a result of our involvement usually include:

  • security maturity assessment, and
  • security upgrade plan, containing a series of recommendations with assigned priority levels, impact on the organization, cost of implementation and alternative solutions.

Because our team has a diverse skillset, such a plan accounts for not only technological aspects, but also solutions dedicated to respective organizational units, such as HR, Finance and Administration. This will enable you to increase your security level from the ground up – where your staff in the performance of duties are exposed to personalised threats and where the most valuable information is to be found.

The key to success in projects related to incident analysis lies in adopting a different perspective, thinking outside the box and recommending custom-tailored solutions. Such an approach guarantees that the security management process will be optimised and the risks for information subject to processing will be minimised.

AUTHOR: Kacper Szułkowski, Senior Consultant, Cybersecurity

Let's talk your business

We provide services related to Digital consulting

We will contact you next working day to identify your needs and tailor our sevices to suit them.

Check again! Some characters you used are not allowed.

Invalid format. Write youraddress@domain.com or phone number +XX XXXXXXXXX.

Request contact

Important topics

See all
Information about cookies

1. As part of the website, the Administrator uses cookies to provide services at the highest level, including in a manner tailored to individual needs.
2. Using the website without changing the cookie settings means that cookies will be stored on your terminal device. You can change your cookie settings in your browser at any time.
3. The Administrator uses cookies to identify the website users, to keep statistics for marketing purposes, and to correctly provide other services offered by the website.
4. Cookies, including session cookies, may also provide information about your terminal equipment and the version of the browser you are using. These tasks are carried out for the correct display of content within the Administrator's website.
3. Cookies are short text files. Cookies do not, under any circumstances, allow the personal identification of a website visitor and no information is stored in them that could allow such identification.
A complete list of the cookies we use and information about their purposes is available in our Privacy Policy.