It’s certainly true that privacy in the 21st century is an illusion. If there is any doubt, look no further than the dystopian nightmare that is Clearview AI. Clearview’s product is essentially a reverse image search – using 3 billion images scraped from social media – that compares an uploaded image to those already in its extensive database. Its facial recognition database has been used by over 600 law enforcement agencies including the FBI. Noteworthy is the fact that most social networks forbid this sort of scraping that Clearview’s repository is built on.
But just as you thought it can’t get worse … it does. It has emerged that Clearview suffered a data breach during which the company’s entire customer list was stolen. Clearview, however, alleges that their vast database of images was not part of the breach and insist that “security is Clearview’s top priority”.
Data breaches are becoming commonplace and how you respond during and in the aftermath of a breach says everything about your organization and how much you value your customers.
1. When a data breach occurs
At this point you require an immediate response from all teams in your organization – Plan4Continuity’s broadcast and call tree options can text anyone in and outside your organization to coordinate, automate and orchestrate the event. IT and business teams will locate and plug any vulnerabilities in your system or business process and set in motion your disaster recovery plan.
2. Pre-empt future attacks
Prevention is better than cure. It’s always good business practice to continuously monitor risk, test responses and ensure the controls are adequate. Here Plan4Continuity has a full suite of simulation schedules and quarterly reviews to make sure your response to a disruptive event is optimum.
3. Parting thoughts from Plan4Continuity
The best way to fight off a data breach (or ransomware attack or phishing), is to not let it happen. This means having controls and security in place to prevent the breach. During a breach, acting quickly and decisively is critical. Plan4Contuinity’s automated plan activates the necessary steps and informs the necessary stakeholders with the push of a button. Further, Plan4Contitnuity’s Cyber Security - Quarterly review plan can assist in preventing attacks from happening at all.
More from our "This is not a drill" series: