- Prevention is better than cure
- What forms part of an IT contingency plan?
- Checklists for IT disaster scenarios
- Measures in the event of a ransomware attack
- Measures in the event of a data breach
- Measures in the event of an IT system failure
- Trust is good; training and testing is better
- Because when it happens, it's urgent
Prevention is better than cure
What forms part of an IT contingency plan?
The contingency plan ensures that a company can respond appropriately, quickly and effectively to IT emergencies. An IT contingency plan for SMEs should contain at least the following documents:
- All contact details of the company management and central IT staff
- All contact details for external IT service providers and cyber insurance
- Documentation of all relevant IT systems, networks and applications – including dependencies and possible effects on business-critical processes
- Templates for communication with key customers, suppliers and partners, as well as with stakeholders such as the National Cyber Security Center NCSC
- Checklists with tasks and responsibilities for the most likely IT emergency scenarios such as data breaches, ransomware attacks or system failures
- List of all documents that may be helpful in an emergency, for example inventory, customer and personnel lists, system and application documentation, or recovery plans.
The IT contingency plan must be physically stored in a secure location and updated at least once a year. All key employees and management must know where to find the plan and be able to access it at any time.
Checklists for IT disaster scenarios
Measures in the event of a ransomware attack
- Disconnect the backup system from the network immediately
- Switch off the router and disconnect all connections to the Internet
- Disconnect the server from the network, but do not switch it off (preservation of evidence)
- Do not pay a ransom – or only in consultation with an experienced service provider specializing in IT emergencies
- Do not communicate via the internal email system
- Do not use possibly infected systems and applications
- No hasty technical system analysis or recovery
Measures in the event of a data breach
- Determine the extent of the stolen or compromised data and document it for the investigation.
- Report the incident immediately to the cantonal police and, in the case of cyberattacks, also to the National Cyber Security Center NCSC. In addition, the Federal Data Protection and Information Commissioner (FDPIC) must be informed in accordance with the Data Protection Act if the risk for the parties concerned is high.
- Consult a lawyer who will assess whether the incident is reportable, communicate with the FDPIC and support the company in dealing with the consequences of the incident.
- Inform all affected (natural and legal) entities.
- Improve technical and organizational measures to improve system security and data protection and prevent such incidents in the future.
Important: SMEs that have taken out cyber insurance should first clarify the coverage of costs with their insurance company before consulting a lawyer.
Measures in the event of an IT system failure
- Disconnect the backup system from the network immediately
- Inform all users
- Localize affected systems and applications
- Check system for hardware and software defects and communication problems
- Clarify dependencies and impact
- Check documentation and recovery plan
- Contact an external IT service provider
Trust is good; training and testing is better
You can say what you like on paper. It is therefore not enough to create an IT contingency plan, print it out and file it away. These measures prevent small and medium-sized enterprises from only finding out how good their contingency plan really is in the event of an emergency:
- Update the IT contingency plan on an ongoing basis and test it regularly, for example through simulated disaster scenarios or exercises
- Continuously adapt the IT contingency plan to current threats, but also to new legal requirements, new IT infrastructures and new technologies
- Make all employees aware of the topics of IT security and data privacy, inform them about the contingency plan and conduct training courses or workshops
Because when it happens, it's urgent
With the measures in the checklists, the IT contingency plan helps companies to handle the first few important hours after a disaster. The company then needs a recovery plan to get the IT infrastructure up and running again as quickly as possible and to restore all important data. How to do it, we explain in the article: A Business Continuity Plan as Plan B in an Emergency.