BUSINESS VENTURE CLINIC
  • Home
  • About
  • Clients
  • Resources
    • Links
    • Videos
  • Blog
  • Contact
    • Clinic Schedule

BLOG POSTS

Preparing for the (Inevitable) Data Breach

2/23/2020

0 Comments

 

Preparing for the (Inevitable) Data Breach

Picture

An estimated 70% of Canadian businesses have been victims of a cyber-attack. It is not as much of a question of if but rather when your business may face its own cyber-attack. Startups, in particular, are especially vulnerable, given the limited number of resources available. With margins being consistently thin, a data breach may be the difference between success and failure. It is, therefore, crucial that you’re aware of the risks and how to best mitigate them. 
 
Cyber incidents typically occur for the following three reasons[1]:
  1. Human Error – employees falling prey to fraudulent phishing emails or other forms of malware.
  2. Operational Failures – internal process failures that could be either software or hardware.
  3. Attacks by cybercriminals – this could range from all sorts actors both internal and external to your organization.
To this end, to ensure that your business is adequately prepared, I have outlined a simple data breach response plan. Ideally, this is read before a data breach and accordingly steps are taken to ensure “breach-preparedness”.
 
The fallout from a cyber attack is best mitigated by being prepared and being aware of the protocols and responses that ought to be triggered. The NIST Framework outlines five core competencies (shown in the diagram below) underpinning any comprehensive cybersecurity policy.[2] I suggest that as a startup, you may want to be most focused on the identification stage of the NIST framework so that you’re able to assess what needs priority protection given the likely limited funds available.





​
​
​





The following steps help outline the approach that organizations need to adopt to create an effective cybersecurity policy.

1.     Governance Team: the executive needs to determine which departments, and which individuals from within those departments need to be assembled on the cyber governance team. A team leader should be appointed. Efforts of the team should be reported to a specialized committee or the board itself to ensure that they are addressing organization-wide concerns relating to potential cybersecurity threats. Understand your requirements under PIPIDA. I have written a more extensive article on how PIPEDA affects you and your business. In short, it applies to most private sector organizations operating in Canada.  For more information, see this blog post.

2.      Current Inventory: Once a governance team is established, it needs to make an accurate inventory of its data and information system. This inventory should include where the physical systems are located, which information is on it, and who has permission to access it. It should also specify any obvious existing vulnerabilities. The key here is to recognize what your systems are so that you can adequately do a full risk assessment in the next step

3.     Risk Assessment: Assess the most common threats that the organization is susceptible to. This could range from malware to phishing attacks. Depending on the complexity of your business and the data it handles, you may wish to seek guidance from a cybersecurity expert to help triage your systems. 
 
4.     Target Profile: Upon completion of the risk assessment, your organization should create a target profile and assess where the threat is most likely to stem from. This could include internal threats such as employees being unaware of various phishing or malware threats that may inadvertently expose your system. 
 
5.     Determine and Prioritize Gaps: By analyzing the gap between your target and current profile, you’re able to detect any significant discrepancies that need to be addressed by the governance team. 
 
6.     Implement Action Plan: Assess deficiencies in the existing cybersecurity regime:
  • Education of employees – By assessing how your employees are interacting with data, you become aware of risks that factor into the preceding risk assessment. Are your employees aware of data loss prevention tools? Do they know how to flag potential breaches? Are users being trained on phishing and malware attempts? Privacy training programs are vital in ensuring that the likelihood and susceptibility of your business being hacked are minimized. 
  • Incident Response Plans – Ensure that your business has simple incident response plans that delineate the manner in which employees are to report and identify a potential data breach. Your response plans should include:
  • Record keeping strategies relating to a breach
  • Insurance considerations ensure you have appropriate coverage
  • Reach out your legal counsel to make them aware of your risk assessment. 
  • Do a cost analysis of how much a cyber threat may impact you financially. Include costs such as: hiring a professional response team, notification costs, administrative and safeguard expenses as well as potential litigation costs. 
To conclude, cyber-incidents, breaches and attacks are costly. They are so expensive that they can be fatal to your growing business. Given the relatively high probability of a cyberattack, it is best to be prepared and to ensure that your team is well-versed in order to deal with any breach. Being “data breach prepared” is the only way to reduce the potential fallout. 
 
Daniel Frederiks is a member of the BLG Business Venture Clinic and is a second-year law student at the Faculty of Law, University of Calgary.
​

REFERENCES
[1] Imran Ahmad, Cybersecurity in Canada: A Guide to Best Practices, Planning, and Management
[2] Ibid.

0 Comments



Leave a Reply.

    BVC Blogs

    Blog posts are by students at the Business Venture Clinic. Student bios appear under each post.

    Categories

    All
    ABCA
    Agreements
    Civil Liability
    Confidentiality
    Contractor
    Contracts
    Corporate Structures
    Directors
    Dispute Resolution
    Employee
    Employment Law
    Force Majeur
    Incorporation
    Indemnification
    Jurisdiction
    Licensing
    Non-Compete
    Patents
    Security Interests
    Shareholder Agreement
    Shareholders
    Software
    Startup
    USA
    Warranties

    RSS Feed

    Archives

    April 2025
    March 2025
    February 2025
    December 2024
    November 2024
    May 2024
    April 2024
    March 2024
    February 2024
    January 2024
    December 2023
    November 2023
    October 2023
    April 2023
    March 2023
    February 2023
    January 2023
    November 2022
    October 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    August 2020
    May 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    April 2019
    March 2019
    February 2019
    January 2019
    November 2018
    October 2018
    May 2018
    April 2018
    March 2018
    February 2018
    November 2017
    October 2017
    August 2017

Terms and Conditions | Privacy Statement
 © 2023 University of Calgary. All rights reserved.
  • Home
  • About
  • Clients
  • Resources
    • Links
    • Videos
  • Blog
  • Contact
    • Clinic Schedule