{"id":4040,"date":"2022-11-15T06:34:40","date_gmt":"2022-11-15T06:34:40","guid":{"rendered":"\/cybersecurity-blog\/?p=3088"},"modified":"2022-12-21T06:42:32","modified_gmt":"2022-12-21T06:42:32","slug":"3-reasons-why-you-need-an-incident-response-plan","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/3-reasons-why-you-need-an-incident-response-plan\/","title":{"rendered":"3 Reasons Why You Need an Incident Response Plan"},"content":{"rendered":"\n<p>Today, cyberattacks are frequent and indiscriminate, striking small businesses and large corporations alike. Research shows that over 60% of organizations worldwide have experienced a cyber security incident at least once, and over 50% of attacks <a href=\"https:\/\/purplesec.us\/resources\/cyber-security-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">targeted<\/a> SMBs.<br><\/p>\n\n\n\n<p>Dealing with a cyber incident can be costly business. In a recent example, an attack directed at INRS \u2014 a university in Quebec \u2014 put the systems of this Canadian academy completely out of order. The cost of restoring them amounted to almost $270,000.&nbsp;<br><\/p>\n\n\n\n<p>But despite just how devastating these attacks are, 77% of organizations still <a href=\"https:\/\/www.helpnetsecurity.com\/2019\/04\/12\/cybersecurity-incident-response-plan\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">lack<\/a> incident response strategies or apply them haphazardly, an IBM Security study shows.<br><\/p>\n\n\n\n<p>Having no clear instructions on what to do during a breach puts security teams in a vulnerable state&nbsp;\u2014 it is unlikely that under stress such teams will perform optimally. And this means mistakes and exacerbated damages.&nbsp;<br><\/p>\n\n\n\n<p>One of the steps to correcting this is creating a cyber incident response plan.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is a cyber incident?<\/h2>\n\n\n\n<p>But before we jump into the details of creating a plan, let\u2019s first establish a definition to understand what constitutes a cyber incident.<br><\/p>\n\n\n\n<p>NCSC <a href=\"http:\/\/ncsc\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">defines<\/a> a cyber incident as a <strong>breach of security policy that compromises the integrity of the system or gives unauthorized access to a third party<\/strong>.&nbsp;<br><\/p>\n\n\n\n<p>There are many <a href=\"https:\/\/any.run\/cybersecurity-blog\/cybersecurity-threats-2022\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">cybersecurity threats<\/a> capable of creating a breach. Here are just some, that small and medium businesses have to grapple with:&nbsp;<br><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Malware<\/strong>: malicious programs such as trojans, info stealers, and ransomware<\/li><li><strong>Phishing<\/strong>: social engineering attempts to trick employes into revealing login credentials or installing destructive malware<\/li><li><strong>Password Hacking<\/strong>: gaining access by cracking weak passwords<\/li><li><strong>Insider Threats: <\/strong>confidential information<strong> <\/strong>accidentally or purposefully leaked by employes<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Why do you need a cyber incident response plan?<\/h2>\n\n\n\n<p>Here are 3 reasons why a cybersecurity incident response plan is crucial for effective defense:<br><\/p>\n\n\n\n<p><strong>1. It prepares you to fend off cyber threats<\/strong><\/p>\n\n\n\n<p>And reduces the amount of damages incurred during incidents. Without a plan, security teams are forced to wing it every time they deal with a threat. This can leave them scumbling, not knowing where to look and what to search for. The result? Higher recovery costs.<br><\/p>\n\n\n\n<p><strong>2. You may be lawfully required to have a cyber response plan<\/strong><\/p>\n\n\n\n<p>Depending on the jurisdiction and the type of business, creating a response plan might be a&nbsp; requirement for you, not a choice. This is especially true for companies that deal with finance or personal data. For example, the <a href=\"https:\/\/www.bclplaw.com\/a\/web\/162968\/12504175-California-Consumer-Privacy-Act-CCPA-Compliance-Progr.pdf#page=5\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">California Consumer Privacy Act<\/a> (CCPA) mandates that companies have a cyber incident response strategy. It\u2019s also a must for the ISO 27001 certification.<br><\/p>\n\n\n\n<p><strong>3. It makes your defense more resilient in the long run<\/strong><\/p>\n\n\n\n<p>With a cyber incident response plan, you will implement a policy of constant evaluation and reiteration. You will learn how to collect data during an incident, then, use the findings to harden your defenses. All of this will help avoid similar incidents going forward.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is a cyber incident response plan?<\/h2>\n\n\n\n<p>An incident response plan is a document that provides a systematic approach to handling different cyber threats.&nbsp;<br><\/p>\n\n\n\n<p>At the very least, the plan should outline how to prepare for, detect, contain and eradicate the threat. Then, restore the system to its pre-attack state while also hardening it. Finally, correct the errors that made the incident possible.&nbsp;<br><\/p>\n\n\n\n<p>But a great plan goes beyond just dealing with malware. It should also consider your communication, PR, legal repercussions, and even <a href=\"https:\/\/any.run\/cybersecurity-blog\/cyber-insurance\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">cybersecurity insurance<\/a>.&nbsp;<br><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>How do you notify users that their data is not safe?<\/li><li>Are you legally protected in case of a leak?<\/li><li>Will you control potential public fallout yourself or with a PR partner?&nbsp;<\/li><li>Who in your team is responsible for communication with the users?&nbsp;&nbsp;<\/li><\/ul>\n\n\n\n<p>These are the types of questions you want to have prepared answers for.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">6 phases of an incident response process&nbsp;<\/h2>\n\n\n\n<p>Incident response plans are structured in such a way as to provide directions chronologically, preventive actions at the top of the document and post-incident recovery towards the end.&nbsp;&nbsp;<br><\/p>\n\n\n\n<p>Depending on a school of thought, response plans will have 4 to 6 phases. (Sometimes containment, eradication, and recovery are merged into one large block).<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/g7a6AFRwPj_gm-rEmyPjagcRxT3TzoCvagosNwdckpjwH6ansJbOQRZ6P9_EYlHE9FCJLesFSGzwYD6Dmhua0boKNospAz0sdyIn86XZpQ4UWZyKvgOLBVMTq_xUAmMnSVm6I0i5VonzMHVvzPoypS3U5QgKcXnY3EyxjPEaBJUUyj_NhWFkvWD2WLGdAw\" alt=\"Six phases of an incident response process \"\/><\/figure>\n\n\n\n<p>Here\u2019s a quick summary of what to consider as you make out the plan for each:<br><\/p>\n\n\n\n<p><strong>1. Preparation&nbsp;<\/strong><\/p>\n\n\n\n<p>This phase is all about getting ready: naming people in charge, assigning battle stations, preparing a war room (yes, that\u2019s an actual thing that people do), and listing attack vectors and attack handling procedures. This way if a breach does happen, your team will know exactly how to act and will stay organized.&nbsp;<br><\/p>\n\n\n\n<p><strong>2. Identification<\/strong><\/p>\n\n\n\n<p>Detecting that you\u2019ve been hit is probably the most difficult part of incident response. But you can increase the chances of finding attack precursors and early indicators by establishing and following logging and monitoring policies. Also, you can use <a rel=\"noreferrer noopener\" aria-label=\"ANY.RUN online malware sandbox (opens in a new tab)\" href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=incident_response_plan&amp;utm_content=landing\" target=\"_blank\">ANY.RUN online malware sandbox<\/a> to view processes created by certain malware and cross-reference them with the activity in your own system.<br><\/p>\n\n\n\n<p><strong>3. Containment<\/strong><\/p>\n\n\n\n<p>The containment phase is about quarantining the infection: shutting down a system, revoking account permissions or disabling certain functions are some of the available strategies for isolating malware. Keep in mind that your tactics and instruments will change based on what type of attack you&#8217;re experiencing.&nbsp;<br><\/p>\n\n\n\n<p><strong>4. Eradication<\/strong><\/p>\n\n\n\n<p>The goal of the eradication phase is to stop the attack completely in its tracks. Some of the instruments used at this stage overlap with the containment phase, and again, your options will change depending on the nature of the incident. For example, in a phishing attack you can suspend a compromised account to disarm the attacker. And a malware infection can be eradicated by restoring the system from a clean snapshot.&nbsp;<br><\/p>\n\n\n\n<p><strong>5. Recovery<\/strong><\/p>\n\n\n\n<p>During the recovery stage, your goal is to get the business process up and running again while also hardening the system. For instance, restore affected components from a trusted backup and patch out any vulnerabilities that were exploited in the incident.<br><\/p>\n\n\n\n<p><strong>6. Lessons Learned<\/strong><\/p>\n\n\n\n<p>The final phase of the plan deals with reiterating on your security practices, armed with the knowledge obtained during the incident. Evaluate the errors that led to the attack, make corrections, and add new policies to the incident response plan.<br><\/p>\n\n\n\n<p><strong>Going in-depth<\/strong><\/p>\n\n\n\n<p>And if you really want to sink your teeth into all the details of creating a response plan, reference the <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-61r2.pdf#page=31\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">NIST Computer Security Incident Handling Guide<\/a>. Just remember that not every organization needs to go this in-depth. It all depends on the type and size of your business.&nbsp;<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Useful tools in the incident response jump kit&nbsp;&nbsp;<\/h2>\n\n\n\n<p>Here, we\u2019ve listed some tools that you\u2019ll want to keep handy, as well as useful practices for different stages of the response process.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table alignleft is-style-regular\"><table class=\"\"><thead><tr><th class=\"has-text-align-left\" data-align=\"left\"><strong>Preparation<\/strong><\/th><th class=\"has-text-align-left\" data-align=\"left\"><strong>Identification<\/strong><\/th><th class=\"has-text-align-left\" data-align=\"left\"><strong>Containment, eradication, recovery<\/strong><\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-left\" data-align=\"left\"><br><strong>Emergency phonebook<\/strong><br><br>So you know who to contact in<br> an incident, both inside the team <br>and out.&nbsp;<\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>ANY.RUN<\/strong><br><br>to analyze suspicious files<br> and links, perform digital forensics<\/td><td class=\"has-text-align-left\" data-align=\"left\"><br><strong>System snapshots<\/strong><br><br>To roll back the system<br> to a clean state<br> using a trusted backup<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Log Retention Policy<\/strong><br><br>Determines how long<br> the data is kept <br>to help security <br>specialists perform analysis<\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Incident Databases<\/strong><br><br>Resources such as<br> the <a href=\"https:\/\/any.run\/malware-trends\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=incident_response_plan&amp;utm_content=mtt\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ANY.RUN trends tracker<\/a><br> help keep track of <br>and study existing threats<\/td><td class=\"has-text-align-left\" data-align=\"left\"><br><strong>Incident Prioritization Table<\/strong><br><br>A formal classification<br> of incident difficulty<br> that helps choose<br> a containment approach: <br>immediate or strategic<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><br><strong>Normal behavior threshold&nbsp;<\/strong><br><br>Establish a guideline<br> for what is normal<br> system behavior <br>to detect anomalies<\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Event correlation<\/strong><br><br>This is a practice<br> of comparing logs<br> to find discrepancies<\/td><td class=\"has-text-align-left\" data-align=\"left\"><br><strong>File backups<\/strong><br><br>Backups of the code<br> stored on a dedicated<br> server can be used to <br>replace compromised <br>files with clean ones<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Using a sandbox to identify threats<\/h2>\n\n\n\n<p>Identifying malware in an infected machine is pretty much like looking for a needle in a haystack.&nbsp;<br><\/p>\n\n\n\n<p>But if you know exactly where to search, suddenly you\u2019re scanning that same haystack with a metal detector, and pulling the needle out with a magnet.<br><\/p>\n\n\n\n<p>Malicious programs leave behind bread crumbs in the form of files, processes, and network activity \u2014 these are Indications of Compromise or IOCs, and they are unique to each malware family. There are organizations that record and catalog such traces in public databases. For example, <a href=\"https:\/\/any.run\/cybersecurity-blog\/mitre-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">ATT&amp;CK MATRIX<\/a>.&nbsp;<br><\/p>\n\n\n\n<p>As long as you know what activity hints at the presence of malware, you can check if such activity took place in a system. This can be useful, for example, to quickly identify which clients have been infected in an organization.<\/p>\n\n\n\n<p>This is where sandboxes come into place. Using an isolated virtual environment, you can force the malware to execute and collect as many bread crumbs as you need.<br><\/p>\n\n\n\n<p>For example, in this <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/app.any.run\/tasks\/18ea80d7-041a-4ea1-b844-5dd20f8cf59d?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=incident_response_plan&amp;utm_content=task\" target=\"_blank\">FormBook task<\/a>, we can see how ANY.RUN generated a <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-report\/\" target=\"_blank\">cyber security incident report<\/a> which revealed all processes created by the trojan.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2022\/11\/2022-11-15_13-12.png\" alt=\"FormBook task in ANY.RUN\" class=\"wp-image-3125\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>We can see them even more clearly in the process graph \u2014 an informative ANY.RUN feature.<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2022\/11\/2022-11-15_13-13-1024x437.png\" alt=\"A process graph in ANY.RUN\" class=\"wp-image-3126\"\/><\/figure>\n\n\n\n<p>This overview gives us a broad idea how to identify this sample in hosts, where it could potentially evade detection and persist. We can do this by running triage sessions over our assets, for instance, using PowerShell.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Cyber incident response is a broad topic \u2014 every company is a little bit different and requires a unique approach to security. There are countless threats, attack vectors and handling strategies to consider, and they change based on the type of business and industry.&nbsp;<br><\/p>\n\n\n\n<p>Perhaps, this is why so many organizations avoid creating cyber incident response plans. And it really does seem like a daunting task. But don\u2019t let this stop you \u2014 even a basic strategy is better than no strategy at all. And a lot of smaller businesses <em>can<\/em> keep it basic.<br><\/p>\n\n\n\n<p>Just remember the generation old wisdom \u2014 better safe, than sorry.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Questions and answers (Q&amp;A)&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>What is a cyber incident?<\/strong><\/li><\/ul>\n\n\n\n<p>A cyber incident is a breach of security policy that compromises a system\u2019s integrity or gives a perpetrator an unauthorized access to a system.&nbsp;<br><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>What is a cyber incident response plan?<\/strong><\/li><\/ul>\n\n\n\n<p>A cyber incident response plan is a document that outlines a company\u2019s incident handling policies in 6 phases: Preparation, Identification, Containment, Eradication, Recovery and Lessons Learned.&nbsp;&nbsp;<br><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Why do I need a cyber incident response plan?<\/strong><\/li><\/ul>\n\n\n\n<p>A cyber incident response plan helps security teams respond to breaches in an organized and thorough way, ensuring complete recovery from an incident.<br><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>What is the main reason for an organization to develop an incident response plan?<\/strong><\/li><\/ul>\n\n\n\n<p>A cyber incident response plan helps organizations manage threats in an effective manner, and leads to lower recovery costs. This is important because a successful cyberattack can induce hundreds of thousands of dollars worth of damages.<br><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>What tools can help me respond to incidents effectively?<\/strong><\/li><\/ul>\n\n\n\n<p>There are many digital forensics tools that are useful during the identification and containment stages. For example, ANY.RUN online malware sandbox can help collect Indicators of Compromise (IOCs) quickly and efficiently.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today, cyberattacks are frequent and indiscriminate, striking small businesses and large corporations alike. Research shows that over 60% of organizations worldwide have experienced a cyber security incident at least once, and over 50% of attacks targeted SMBs. Dealing with a cyber incident can be costly business. In a recent example, an attack directed at INRS [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3990,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[10,21],"class_list":["post-4040","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifehacks","tag-cybersecurity","tag-incident-response"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>3 Reasons Why You Need an Incident Response Plan - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"A cyber incident response plan helps security teams manage breaches and contain damages. Learn why your organization needs it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/3-reasons-why-you-need-an-incident-response-plan\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/3-reasons-why-you-need-an-incident-response-plan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/3-reasons-why-you-need-an-incident-response-plan\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"3 Reasons Why You Need an Incident Response Plan\",\"datePublished\":\"2022-11-15T06:34:40+00:00\",\"dateModified\":\"2022-12-21T06:42:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/3-reasons-why-you-need-an-incident-response-plan\/\"},\"wordCount\":1828,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"cybersecurity\",\"Incident Response\"],\"articleSection\":[\"Cybersecurity Lifehacks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/3-reasons-why-you-need-an-incident-response-plan\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/3-reasons-why-you-need-an-incident-response-plan\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/3-reasons-why-you-need-an-incident-response-plan\/\",\"name\":\"3 Reasons Why You Need an Incident Response Plan - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2022-11-15T06:34:40+00:00\",\"dateModified\":\"2022-12-21T06:42:32+00:00\",\"description\":\"A cyber incident response plan helps security teams manage breaches and contain damages. Learn why your organization needs it.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/3-reasons-why-you-need-an-incident-response-plan\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/3-reasons-why-you-need-an-incident-response-plan\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/3-reasons-why-you-need-an-incident-response-plan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Lifehacks\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"3 Reasons Why You Need an Incident Response Plan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 Reasons Why You Need an Incident Response Plan - ANY.RUN&#039;s Cybersecurity Blog","description":"A cyber incident response plan helps security teams manage breaches and contain damages. Learn why your organization needs it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/3-reasons-why-you-need-an-incident-response-plan\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/3-reasons-why-you-need-an-incident-response-plan\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/3-reasons-why-you-need-an-incident-response-plan\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"3 Reasons Why You Need an Incident Response Plan","datePublished":"2022-11-15T06:34:40+00:00","dateModified":"2022-12-21T06:42:32+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/3-reasons-why-you-need-an-incident-response-plan\/"},"wordCount":1828,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["cybersecurity","Incident Response"],"articleSection":["Cybersecurity Lifehacks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/3-reasons-why-you-need-an-incident-response-plan\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/3-reasons-why-you-need-an-incident-response-plan\/","url":"https:\/\/any.run\/cybersecurity-blog\/3-reasons-why-you-need-an-incident-response-plan\/","name":"3 Reasons Why You Need an Incident Response Plan - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2022-11-15T06:34:40+00:00","dateModified":"2022-12-21T06:42:32+00:00","description":"A cyber incident response plan helps security teams manage breaches and contain damages. Learn why your organization needs it.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/3-reasons-why-you-need-an-incident-response-plan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/3-reasons-why-you-need-an-incident-response-plan\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/3-reasons-why-you-need-an-incident-response-plan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Lifehacks","item":"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/"},{"@type":"ListItem","position":3,"name":"3 Reasons Why You Need an Incident Response Plan"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4040"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=4040"}],"version-history":[{"count":1,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4040\/revisions"}],"predecessor-version":[{"id":4042,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/4040\/revisions\/4042"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/3990"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=4040"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=4040"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=4040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}