USA Trends and Developments Contributed by: Beth George, Timothy Howard, Brock Dahl and Megan Kayo, Freshfields
• implementing network segmentation, includ - ing by following the principle of least privilege and limiting third-party access to systems and data; • sufficiently logging and monitoring, which is crucial for any investigation and can help identify anomalous behaviour that could sig - nal an insider threat risk; and • regularly backing up critical data and testing those back-ups to help minimise the impact of ransomware and increase the likelihood that the company can recover without making a ransom payment.
Leveraging these practices as part of a compre - hensive information security programme may not prevent all incidents. However, such practices can minimise damage if a cyber-attack occurs, which – in turn – can minimise liability (including personal liability) in relation to a cyber-attack.
364 CHAMBERS.COM
Powered by FlippingBook