Preparing for a Network Breach

Data and information, unlike physical objects, don't disappear when they're stolen. Routine planning and preparation will allow for quick, decisive action—the best response to a data breach.

by Steve Bernstein, Executive Director, Treasury Services

Imagine that your computer network is a large building with password-protected locks on all the entries. It’s easy to tell if someone tampers with the locks or forces down a door. But, it wouldn't be so easy to identify which files the intruders had snooped through and whether they found anything of value. Data and information, unlike physical objects, don't disappear when they're stolen.

While it's impossible to account for every vulnerability in your system, you can have strong incident protocols in place that will help you minimize damage, and maybe avoid costs from litigation altogether. Routine planning and preparation will allow for quick, decisive action—the best response to a data breach.

Learn More

E-mail us to learn how we can support the needs of your business.

 

Copyright © 2018 JPMorgan Chase & Co. All rights reserved.