
John Kavanagh
Managing Director, Marsh Commercial
While no organisation wants to experience a cyber incident, they are increasingly frequent today, making proactive preparation critical. The tone from the top of an organisation plays an important role. Organisations may want to consider viewing incident preparation as an opportunity to shore up defences and foster a cyber-resilient culture. By adopting a mindset focused on readiness, organisations may be able to turn a potential crisis into a more manageable event, with the goal of minimising operational, financial, and reputational impact.
Organisations that prioritise planning and training not only may be more effective and confident, but can reduce the cost of an incident as this may shorten recovery time, as well as potentially aid with insurance claims. From ransomware attacks and accidental data leaks to third-party outages and AI-enabled threats, today’s digital risk landscape demands more than technical responses. It requires strategic, company-wide readiness. Resilience and recovery can depend on preparation, coordination, and execution. When the pressure is on, a well-rehearsed response plan can make all the difference.
Today’s attackers are often highly professional and work in sophisticated organisations. Rather than using brute-force attacks to reach their targets, they increasingly use social engineering, insider access, or other means to steal credentials. They do not break into the organisation; they log into it. Once there, they might wait for months before acting.
But not all cyber incidents are caused by malicious actors, and not all of the causes are obvious. Many incidents stem from basic human error or outdated systems and flawed processes, such as a failure to deactivate credentials when someone leaves the business. Below are some of the incident types to consider when planning a response.
The most effective responses tend to start long before an incident occurs. Preparation is about more than IT controls; it is about readiness across the entire organisation. Having a plan can be essential, but for the plan to be effective, it must be understood, regularly practiced, and kept updated as internal and external circumstances change.
A common planning weakness is that businesses fail to coordinate across departments. The chief information security officer (CISO) might think they understand the organisation’s essential processes and prioritise restoring them in the event of an outage, but the operations team might be expecting other processes to be restored first. For example, IT might prioritise getting the email system back online while the finance department is urgently waiting for the enterprise resource planning (ERP) system so they can process payroll. It is also important to note that, in many cases, the CIO — not the CISO — is responsible for system restoration. While their responsibilities may differ, their priorities should be aligned, with the goal of obtaining an effective response. Alignment between internal teams and external stakeholders may also be critical when it comes to insurance claims.
These misalignments can cause costly delays if they are not identified and dealt with during the planning phase.
Cybersecurity awareness training combined with ongoing vulnerability management can be essential for building cyber resilience. Organisations that prioritise proactive training and implement rigorous vulnerability assessments and patching procedures were found to be better equipped to reduce risks posed by evolving cyber threats.
When a cyber incident happens, the initial reaction is often confusion. It can be hard to know what exactly is happening, how is it happening, and what the immediate steps should be to contain it. Time is of the essence but so is discipline. Having a good plan in place is one of the best ways to help confirm that the important questions are addressed, and that the right actions are taken. Jumping too quickly to recovery, or failing to coordinate legal, technical, and reputational strategies, can worsen the impact.
One potential mistake is wiping and re-imaging devices too soon, destroying valuable evidence that would be useful to investigators or erasing data that is not backed up elsewhere. Another common problem is when teams restore from backup without knowing how long an attacker has been in the system. It is possible the backup is also compromised.
Once the immediate threat has been neutralised, the real work begins. As well as the technical task, recovery is a financial and operational challenge that may stretch out.
It is not unusual to have to reconstruct billing records from scratch because backups were either encrypted or incomplete, or to face prolonged downtime because virtual infrastructure configurations were not backed up. At this stage, documentation is vital, both for regulatory compliance and for supporting insurance claims.
The most resilient organisations tend to treat cyber readiness as an ongoing discipline, not a one-off project. They know incident response is as much about people and processes as it is about firewalls and backups.
Please note that the use of a cyber incident management plan, including the above checklists, does not guarantee any result, including the outcome of any potential claim.
To learn more about incident preparation and the steps you can take to build cyber resilience, please contact your Marsh Commercial representative, or provide your details and a member of our team will get in touch.
Managing Director, Marsh Commercial