Another area which demands attention before an attack is the overall security platform, including the office’s network. Regular assessments of the complete infrastructure and attack profile are necessary to identify and fix weak points. This might require outside help, and there are providers who can advise. Some offer penetration testing to see if systems and personnel are doing the right things to prevent a breach.
There should be continuous monitoring and alert systems implemented so that a problem can be identified instantly, before too much damage occurs. Firewalls and other perimeter security must be used and can be configured so attacks and suspicious activity are flagged and forwarded for action. These attacks can occur at inconvenient times, so someone must be on call 24 hours a day, 7 days a week, and 365 days per year.
Also, keep in mind it is not only a network’s external surface that can be attacked. Many breaches occur from within, such as disgruntled employees. Proper internal security must be maintained, and information must be accessible on a need-to-know basis only, through things like restricted access accounts. If there is no need for a user to acquire particular information, they should not have access. Remember also to practice good user management, such as immediately deactivating accounts if an employee leaves or no longer needs to access the system.