1. Identify
2. Preserve
3. Remove Hack
4. Investigate
5. Close up breach
6. Report
7. Monitor
Breach Response Summary
Slide 19
Slide 19 text
“I use an iframe payment gateway, I’m safe”
No one is safe
Slide 20
Slide 20 text
What should you do?
How much should you spend?
Slide 21
Slide 21 text
● Fines from Visa & Mastercard
● Increased transaction costs
● Increased business insurance costs
● Fines from ICO
● Loss of business as customers lose trust
● Time & money spent investigating and resolving hack
Business Impact
Slide 22
Slide 22 text
Marketing Team vs Security Team
Flexibility vs control
The Dichotomy
Slide 23
Slide 23 text
● Password management tool
● Two-factor auth or IP whitelisting
Admin Security
Slide 24
Slide 24 text
Web application firewall, e.g. Cloudflare
Firewalls
Slide 25
Slide 25 text
● Keep core & modules up to date
● Security audit each module
Code
Slide 26
Slide 26 text
● Sign your JS where possible.
Subresource Integrity