PR & COMMS TIPS FOR MANAGING UNPREDICTABLE DATA BREACHES - Signal AI
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
PR & COMMS TIPS FOR MANAGING UNPREDICTABLE DATA BREACHES Words: Caity Dalby Photography: Adobe Stock/Creative Commons
INTROD A BREACH MAY BE UNPREDICTABLE, BUT HOW YOU REACT, COMMUNICATE, UCTION Data breaches can happen at any time, anywhere, and affect any organisation. So how can you ensure that you’re prepared to deal AND RECOVER, SHOULDN’T BE. with cyber attacks as and when they happen? Having a defined, documented and well-distributed internal data breach communications strategy - supporting and enhancing the companies’ wider recovery plan - is key to managing an unpredictable cyber attack. A breach may be unpredictable, but how you react, communicate, and recover, shouldn’t be. And with British Airways being handed a record fine by the Information Commissioner’s Office (ICO) for their 2018 data breach, cyber resilience is of paramount importance. [1]
Cyber resilience is defined as the ability of an organisation or business to anticipate, withstand, contain, recover, and evolve after a data breach (The Chartered Institute of Procurement & Supply, CIPS). [2] ANTICIPATE, WITHSTAND, CONTAIN, RECOVER, AND EVOLVE When approaching these principles of cyber resilience, they can be separated into three primary stages: Before, During and After. Planning an extensive communications strategy for each stage, whilst ensuring you have a cohesive plan that touches every point in the business, is the key to cyber resilience. How you utilise your PR and comms to manage an unpredictable cyber attack can be the difference between substantial fines and surviving a data breach with minor reputational damage. We look at the Before, During and After stages in the process of managing an unpredictable cyber attack, with examples of the good, the bad, and the ugly in cyber resilience. RESILIE NCE
BEF ORE PREPARATION, PLANNING AND PEOPLE Preparation and Planning Firstly, you need to define what a “data breach” means to your company. Every company is different in whose data it holds and how it stores that information. There needs to be a definitive idea of what a data breach or cyber attack looks like for your company and a company-wide understanding before you can plan your withstand, contain, THERE NEE recover and evolve strategy. DS Once that is clear, a strategy needs to be TO BE AN built and put in place. This includes conducting ACCEPTANC simulations, a plan for internal responsibility E AT and management during the breach, and the curation of a wide-range of pre-written ALL LEVELS People collateral. These will range from social media THAT posts, marketing campaigns, press releases DESPITE AL The human aspect of managing and general proactive PR outreach, and quotes L THE an unpredictable data breach within or testimonials for key spokespeople. These PREPARATI a company is paramount to the success are all of equal importance and none can work ON of recovery. in isolation; only a holistic and wide-reaching AND PLANN First and foremost, there needs to be communications strategy will be effective. ING an acceptance at all levels that despite all the IN THE WOR preparation and planning in the world, you may LD, still be targeted and suffer from a cyber attack. YOU MAY ST No one is invincible or impervious. ILL BE TARGETED Second, clear planning needs to take place with a broad range of stakeholders. This includes the CEO, CMO, Head of Communications, and beyond. Key decision makers should plan a strategy in advance, matching responsibilities to those who can take action, and outlining how these plans compliment the wider communication strategy. This ensures a brand’s reputation and values are upheld and that consistent messages are delivered across channels.
MYFITNESSPAL On 25 March 2018, 150 million MyFitnessPal customers had their accounts hacked and personal details stolen in a cyber attack on the sports giant - usernames, email addresses, and passwords were compromised. The parent company, Under Armour, stated that they became aware that “an unauthorized party acquired data associated with MyFitnessPal user accounts” in February 2018, a month before the public announcement. [3] MyFitnessPal are a prime example of inadequate preparation, despite their initial seemingly adequate response. They not only failed to notice that their systems had been hacked for an entire month, but they had neglected to prepare or implement a plan for how to effectively deal with a cyber attack. They didn’t have a way to ensure that their customer’s data would be protected post-data breach. This has come to a head, as it has recently become apparent that some of the hacked data has become available to purchase on the Dark Web a year after the data breach. [4] In a report from The Register, the hacked data from MyFitnessPal is on sale, alongside credentials from 15 other websites and apps, for less than $20,000 in Bitcoin. [5] Despite minor encryption of passwords and MyFitnessPal’s instruction to its customers to change their passwords, the selling of these details could cause issues for people who reuse passwords across multiple websites. The ramifications of the MyFitnessPal data breach aren’t as far reaching as others, however the sheer scale of the cyber attack and the continuing problems that are arising display an internal lack of forward planning.
DUR ING CONTROL, CONTAIN AND MONITOR Control and Contain As you work to control and contain an unpredictable cyber attack, there needs to be an admission of clear liability and acknowledgement of responsibility from important messages aren’t missed and the organisation is responding in a timely fashion. This is as much the case with the acknowledgement of liability from the media-facing spokespeople. Saying sorry, company’s spokesperson/people, as it is and knowing when it’s appropriate to say it, with messaging on social media channels zone to your company’s HQ, there needs to is incredibly important. And as enquiries and and the website. be a backup plan. Having a contingency press coverage increase during incidents, plan for when your workforce goes home it’s important to move away from solely As such, you need to have tight control for the day should not be overlooked: reactive action and be seen to be proactive. over your communications channels. organise employees to take shifts, provide This includes stopping scheduled on-the-go resources so employees can continue communications in the form of press to work at home, or bring in outside support. SAYING SORRY releases and marketing campaigns, and making sure multiple people have Another aspect of the control and containment AND KNOWING access to the businesses’ social media accounts. period of managing an unpredictable cyber attack is the ability of your website to handle a dramatic spike in traffic. Websites often WHEN IT’S When communicating messages during a data breach, it’s important to consider see a rise in visits once a data breach has been announced publicly and reported in the APPROPRIATE your audiences, the social media channels they use, the type of content they respond press, as members of the public look to official channels for answers. Ensure all information is “REMEMBER to, and what they will be expecting in this up-to-date by setting aside a plan of action to TO SAY IT, IS situation. Maximising your reach in this way will encourage engagement and awareness; bring in more resources. Factoring in time for training and providing additional equipment THE 3 RS - INCREDIBLY whilst connecting with your audience in a professional and reassuring manner will is useful. RECOGNISE, help contain the fallout of the data breach. In the same vein as providing adequate IMPORTANT. It’s important to be aware and mindful of the feelings of customers that have been directly resources, technical competence within the business or a detailed plan for outsourcing REGRET AND impacted by the data breach. technical support needs to be in place. As Jon Sellors, Head of Corporate Comms at LV=, says you should “Remember the 3 Rs - It’s also key to consider time-zones and out Recovering quickly, with as little reputational damage as possible, is unlikely if you don’t RESOLVE.” recognise, regret and resolve.” of hours support as the flurry of activity and have the fundamental technical competence JON SELLORS, messages won’t stop when your standard to fix what led to the data breach in the first When in the midst of a data breach clear lines operating hours end. And if a crisis begins place and to implement a multi-channel PR HEAD OF CORPORATE of communication are crucial to ensuring out of hours, or surfaces in a different time- and communications strategy. COMMS, LV=
UTILISING A MEDIA MONITORING AND REPUTATION MANAGEMENT PLATFORM, SUCH AS SIGNAL A.I. CAN AUTOMATE THE MONITORING PROCESS AND ALLOW YOU TO RESPOND TO MEDIA COVERAGE IN REAL-TIME. Monitor Staying informed during any kind of crisis, As previously mentioned, it’s important to be truly but especially during a public data breach, global with your cyber resilience plan and media is essential. Knowing who is talking about monitoring during a data breach. With cyber you, the press you’re receiving, and the attacks hitting companies globally, out of hours, sentiment of that press, can make all the in a different time zone to HQ, or focused on a difference in the outcome of your specific regional part of a business, the reach of recovery process. your media monitoring needs to extend beyond English language news sources. Utilising a media monitoring and reputation management platform, such as Signal A.I., The Signal A.I. platform accurately categorises, can automate the monitoring process and translates and extracts intelligence from over allow you to respond to media coverage in three million media sources a day and surfaces real-time - a must in the modern 24-hour news the relevant information in real-time. You should cycle. The Signal A.I. platform mirrors the invest in a media monitoring tool that provides established workflow of a business, automating you with an invaluable global outlook and head media monitoring, reporting and analysis, to free start when dealing with media fallout during and up time for key stakeholders and spokespeople after a breach. to focus on making informed decisions in the cyber attack recovery process.
SONY A great example of efficient and effective control and containment of a data breach is the 2011 cyber attack on SONY’s PlayStation Network. The data breach is viewed as the worst to hit the gaming community of all-time. It impacted 77 million PlayStation Network accounts, and out of these accounts 12 million had unencrypted credit card numbers. Hackers gained access to full names, passwords, e-mails, home addresses, purchase history, credit card numbers, and PSN/Qriocity logins and passwords. The data breach hit SONY hard, with the website down for a month and estimated losses of $171 million. Despite the financial ramifications of this incident, it serves as a great example of corporate responsibility - knowing how and when to say sorry. IT SERVES AS A GREAT EXAMPLE OF CORPORATE RESPONSIBILITY - KNOWING HOW AND WHEN TO SAY SORRY. Like many companies that experience a data breach and the inevitable backlash that comes from it, SONY’s approach wasn’t without faults and imperfections. However, they knew when to take responsibility as a company, how to apologise, and which spokespeople had to take public liability. In a move that helped to save them from further reputational damage, SONY’s president and two senior executives stepped-up as media facing spokespeople to apologise publicly and accept liability for the data breach. [6]
AFTER LEARN, EVOLVE AND UNDERSTAND Once the dust has settled and media Communicate coverage has slowed, it’s time to learn from the YOU NEED TO experience, evolve so it is less likely to happen There also needs to be continuing and clear, again, and understand why it happened to you in the first place. key messaging about the breach in the aftermath. Companies’ need to proactively ASSESS WHAT YOU provide information on any ongoing Learn and Evolve investigations, the results of these, and further CAN DO TO CHANGE actions they are taking to ensure the data There isn’t a definitive step-by-step process to follow in the aftermath of a data breach. they hold is more secure. THE REPUTATION & But once you’ve managed to withstand the With the implementation of GDPR in Europe initial cyber attack, you need to go back and other data protection laws across the PUBLIC PERCEPTION to the drawing board with the rare opportunity globe, including the US Federal Trade to shape and improve your processes. All of the following need to happen simultaneously Commission Act, consumers are more acutely aware of their rights. They have a better and OF YOUR COMPANY. for a business to truly come out of a serious more informed understanding of how data data breach the better for it. protection and security works, the value of Understand their information, and the consequences for You need to re-prep and plan for next time. businesses that do not comply. As a result, In tandem with the above actions, as a business And don’t be complacent as there may very it’s absolutely necessary for you to not shy you need to define why you were the target for well be a next time. This involves evaluating away from it, the press and your customers a cyber attack. This can be for a multitude of what in your current strategy to manage an certainly won’t. reasons, but defining why you were targeted unpredictable cyber attack did and didn’t work. will be invaluable information to possess in the learning and re-planning process. And again, it is You need to question everything the business did in reaction. Did you monitor the media THERE NEEDS TO an opportunity to realign and direct the company in a different direction. being produced about you adequately enough to provide real-time, useful updates? Can BE CONTINUING Businesses are either randomly targeted or you confidently claim that you effectively chosen due to obvious (to cyber attackers) contained the damage through both reactive and proactive measures? Was your messaging & CLEAR KEY security flaws or for reputational reasons. In the case of Ahsley Madison, the extra-marital dating site, it’s no surprise that it was reputation driven. about the data breach clear and informed? An outside mediator, moderator, or security MESSAGING ABOUT If you determine that you were targeted because provider may be necessary for this process as of the latter, you need to assess what you can do objectivity is hard to maintain. THE BREACH IN to change your reputation and public perception of your company. THE AFTERMATH.
ASHLEY MADISON Reputation is everything, especially when and chief technology officer of the company yours attracts “vigilante” hacking groups. in April 2017, made a point to publicise the security measures they implemented following Ashley Madison, or The Ashley Madison the breach: two factor authentication, a bug Agency under the parent company Ruby Corp, bounty program, adherence to the NIST suffered a massive security breach in 2015 cybersecurity standards, a no-third party policy that exposed over 300 GB of user data. This when it comes to user’s information, and included users’ real names, banking data, new chief information and security officers. credit card transactions, and secret sexual “Security and discretion” were described fantasies. among Buell’s key focuses for 2018. The vigilante hacking group, ‘The Impact Team’, demanded a ransom for Ashley Madison’s user’s data, as a punishment for the company not keeping the data secure. This “ASHLEY’S CORE wasn’t paid and the ramifications of the data breach were far reaching, impacting both the DIFFERENTIATOR business and its users, leading to numerous “[r]esignations, divorces and suicides.” [7] IS DISCRETION.” According to the Federal Trade Commission RUBEN BUELL, (FTC) complaint post-hack, Ashley Madison FORMER PRESIDENT & CTO, “had no written information security policy, no reasonable access controls, inadequate RUBY (ASHLEY MADISON) security training of employees, no knowledge of whether third-party service providers were This seems to have worked; by gradually using reasonable security measures, and rebuilding their reputation and focussing no measures to monitor the effectiveness their efforts on regaining public trust they are of their system security.” [7] Part of the FTC reported to have “191,000 daily active users settlement required that the company add (defined as members who have exchanged “a comprehensive data-security program, messages) and 1.4 million new connections including third-party assessments.” made each month.” [8] In the years since the cyber attack, Ashley Whether you agree with the platform or Madison have been quietly recuperating and not, their bounceback after the data breach evolving. They have by no means done a and subsequent success says a lot for their perfect job at post-breach recovery, but the recovery and evolution. intention is there. They have defined, and now understand, why they were a target - both reputational and ease of access. Importantly, they have put the groundwork in to repair their damaged business. In a major change, Ashley Madison have realigned their central message. They now exist to help those in loveless/sexless marriages, those going through divorce and illness. Ruben Buell, who became president
If handled incorrectly data breaches can break a company financially, irreparably damage reputation, or have devastating consequences for customers. And they can happen to any business. Curating and Bibliography implementing a communications and PR [1] British Airways faces record £183m fine for data breach, BBC News (8 July 2019). strategy for managing an unpredictable [2] Cyber Crisis Management Plan for countering cyber attacks and cyber terrorism, The Chartered Institute of cyber attack is paramount for a businesses’ Procurement & Supply (CIPS), 2018. survival of, and recovery from, a data breach. [3] MyFitnessPal: Notice of Data Breach, MyFitnessPal (29 March 2018). [4] Hacked MyFitnessPal Data Goes on Sale on the Dark Web—One Year After the Breach, Fortune (14 February 2019). [5] 620 million accounts stolen from 16 hacked websites now for sale on dark web, seller boasts, The Register (11 By doing what you can to ensure cyber February 2019). resilience through adequately anticipating, [6] Sony bosses apologise over theft of data from PlayStation Network, The Guardian (1 May 2011). stoically withstanding, efficiently containing, [7] Life after the Ashley Madison affair, The Guardian (28 February 2016). effectively recovering, and evolving with [8] Ashley Madison attempts to regain the public’s trust, engadget.com (29 March 2018). humility, brands can safeguard themselves. And ultimately, and fundamentally more importantly, businesses can protect their customer’s data.
Signal is the A.I. powered media monitoring platform delivering strategic insights that help you make the best possible decisions. For more information email hello@signal-ai.com or call us on +44 (0) 20 3828 8200 (UK and rest of world) or +1 917 398 5931 (US).
You can also read