• Daily News
  • Features
  • Events
    • DBusiness Events
    • D500 Soirée
    • Party Pictures
    • Partner Events
    • Photography Request Form
  • Resources
    • 30 in Their Thirties
    • Company Milestone Profiles
    • Detroit 500
    • Commercial Real Estate Awards
    • Top Corporate Culture Awards
    • Powered by Women
    • Faces of DBusiness Law
    • Faces of Detroit
    • Top Corporate Council Awards – Logo
    • From The Top Lists
    • Michigan Makers
    • Northern Michigan Restaurant Guide
    • Financial Professionals
    • Business Professionals
    • Lawyers
    • Other Professionals
    • Restaurants
    • Shopping
    • Videos
  • Magazine
    • Archive
    • Careers
    • Digital Edition
    • Subscribe
    • Purchase Single Issues
    • Editorial Calendar
    • Newsletters
    • Where to Find
    • Contact
    • Advertise
      • Digital Studio
  • Hustle and Muscle
    • Hustle and Muscle Features
    • Startup Submissions
    • The Hustle
    • The Muscle
Sign in
Welcome!Log into your account
Forgot your password?
Create an account
Privacy & Cookies Policy
Sign up
Welcome!Register for an account
A password will be e-mailed to you.
Privacy & Cookies Policy
Password recovery
Recover your password
Search
  • Subscribe
  • Contact
  • Archive
  • Advertise
  • Business Professionals
  • Financial Professionals
  • Lawyers
  • Other Professionals
  • Restaurants
  • Shopping
Sign in
Welcome! Log into your account
Forgot your password? Get help
Create an account
Privacy & Cookies Policy
Create an account
Welcome! Register for an account
A password will be e-mailed to you.
Privacy & Cookies Policy
Password recovery
Recover your password
A password will be e-mailed to you.
DBusiness Magazine DBusiness Magazine
DBusiness Magazine DBusiness Magazine
  • Daily News
  • Features
  • Events
    • DBusiness Events
    • D500 Soirée
    • Party Pictures
    • Partner Events
    • Photography Request Form
  • Resources
    • 30 in Their Thirties
    • Company Milestone Profiles
    • Detroit 500
    • Commercial Real Estate Awards
    • Top Corporate Culture Awards
    • Powered by Women
    • Faces of DBusiness Law
    • Faces of Detroit
    • Top Corporate Council Awards – Logo
    • From The Top Lists
    • Michigan Makers
    • Northern Michigan Restaurant Guide
    • Financial Professionals
    • Business Professionals
    • Lawyers
    • Other Professionals
    • Restaurants
    • Shopping
    • Videos
  • Magazine
    • Archive
    • Careers
    • Digital Edition
    • Subscribe
    • Purchase Single Issues
    • Editorial Calendar
    • Newsletters
    • Where to Find
    • Contact
    • Advertise
      • Digital Studio
  • Hustle and Muscle
    • Hustle and Muscle Features
    • Startup Submissions
    • The Hustle
    • The Muscle
Home Sponsor Content WISPs Allow Businesses to Minimize Risk from Cyberattacks and Data Breaches
  • Sponsor Content
Sponsored

WISPs Allow Businesses to Minimize Risk from Cyberattacks and Data Breaches

Businesses can manage cyberattack and data breach risks by implementing a written information security program.
By
Plunkett Cooney
-
October 6, 2025
258
Facebook
Twitter
Pinterest
WhatsApp

    With the emergency of new technologies, the business landscape is rapidly changing. Executives are excited about technology and innovation. Unfortunately, progress has given rise to similarly emergent risks, including cyberattacks and data breaches.

    Miriam Webster defines “cyberattack” as “an attempt to gain illegal access to a computer or computer system for the purpose of causing damage or harm.” Data breaches may arise from cyberattacks or from inadequate data security. Companies and their management teams should have a plan, both defensively to guard against cybercriminals and data breaches, as well as offensively with a contingency plan for response in the event of an incident.

    Cyberattacks and data breaches are costly. A global study by IBM examining data breaches occurring in over 500 organizations between March 2023 and February 2024 concluded that the cost of a data breach in this sample set was an average of $179 per customer record or $4.88 million total.  This includes costs associated with detection, investigation, containment and remediation, as well as post-breach consequences to those affected organizations.

    Not only is preemptive planning good business, it’s often a requirement. Many statutes such as the Health Insurance Portability and Accountability Act (HIPAA), require that businesses adopt formal incident response plans. Individual states have increasingly passed data security laws setting standards that effectively mandate cybersecurity and cyber incident response planning.

    While Michigan does not currently have a comprehensive state-wide privacy law, in August 2025 the Michigan Senate approved Senate Bills 360-364, which would make changes to Michigan’s Identity Theft Protection Act (PA 452 of 2004). These bills would require companies that store, collect or access personal information to implement stronger security measures and require greater investigation and notification obligations than those under current law. The bills will now move to the Michigan House of Representatives for consideration.

    Organizations should start now to mitigate their cyber risk by implementing a Written Information Security Program (WISP). A WISP should specify elements of the entity’s overall data security plan, which should include identifying, tracking and managing potential risks; implementing detailed policies and procedures for information security; maintaining a cyber incident response plan; and specifying internal controls, as well as administrative security measures. Your WISP should also include a comprehensive cyber incident response plan.

    Organizations should tailor such plans to meet their unique needs. An effective plan should include a designated response team comprised of qualified individuals from within the organization or outside advisors. Appointing a standing response team avoids having to figure out duties and responsibilities during a high-stakes emergency and gives the team an opportunity to plan for incidents in advance. While the team may be comprised of managers from the organization, it is beneficial to include legal counsel to ensure that any incident investigation is subject to the attorney-client privilege.

    As soon as a business discovers a possible data breach or cyber incident, it should immediately convene the incident response team. The team should work to identify the cause of the incident, investigate and contain the issue. During the process, the team must collect data and preserve forensic evidence that may be relevant to the event. It may be necessary to shut down certain systems or even limit operations to mitigate the effects of the incident.

    With effective plans and policies in place, businesses will find themselves better prepared for potential cyber incidents, should they arise. A comprehensive WISP and qualified response team will allow businesses to navigate any potential data protection and cybersecurity landmines.

    Website
    plunkettcooney.com


    Author
    Glenn C. Ross, Partner
    38505 Woodward Ave., Suite 100
    Bloomfield Hills, MI  48304
    T: (248) 433-2312
    F: (248) 901-4040
    gross@plunkettcooney.com







    Facebook
    Twitter
    Pinterest
    WhatsApp
      Previous articleJay Alix Partners with Dave Tayeh to Launch Tayeh Capital Group
      Next articleMichigan Mobility Institute Transfers Workforce Development Programs to SAE
      Luanne Lim

      RELATED ARTICLESMORE FROM AUTHOR

      Sponsored

      The Connection Architects: How WZC Networking Powers Michigan’s Digital Infrastructure

      Anna's House
      Sponsored

      Anna’s House Expands East: Michigan Breakfast Brand Continues Rapid Growth with Grand Ledge Opening

      Sponsored

      The H-1B Lottery is Not Dead (Yet)

       

      NEWSLETTERS

      DIGITAL SPONSORS

      Detroit 500
      Venture Capital
      Commercial Real Estate
      Powered by Women Sidebar
      30 in their Thirties
      Top Corporate Counsel Sidebar
      Top Lawyers
      Compendium News Links

      FOLLOW US

      4,462FansLike
      1,305FollowersFollow
      19,399FollowersFollow

      FROM OUR PARTNERS

      Sponsored

      The Connection Architects: How WZC Networking Powers Michigan’s Digital Infrastructure

      November 3, 2025
      Anna's House
      Sponsored

      Anna’s House Expands East: Michigan Breakfast Brand Continues Rapid Growth with...

      November 3, 2025
      Sponsored

      The H-1B Lottery is Not Dead (Yet)

      November 2, 2025
      Sponsored

      Your Brand and the AI Visibility Gap: What Modern CMOs and...

      October 23, 2025
      Sponsored

      Michigan’s #1 Cannabis Industry Conference to Connect Professionals Through Knowledge Sharing...

      October 13, 2025
      DBusiness Magazine
      ABOUT US
      DBusiness Magazine – Detroit’s Premier Business Journal
      FOLLOW US
      • Archive
      • Subscribe
      • Careers
      • Contact
      • Advertise
      • Terms of Use
      • Privacy & Cookies Policy
      © 2025 - DBusiness Magazine
      Near me
      40 miles