send link to app

Breach Plan Connect® app for iPhone and iPad


4.0 ( 5040 ratings )
Business
Developer: NetDiligence
Free
Current version: 1.1, last update: 1 year ago
First release : 25 May 2020
App size: 22.79 Mb

This app is a free companion to Breach Plan Connect® (BPC), a software-as-a-service (SaaS) platform, powered and hosted by NetDiligence®. To use this app, you must have a valid login to the SaaS version of BPC.

Do you have a cyber-focused incident response plan, and can you access it at a moment’s notice from your mobile phone? Most organization don’t. In fact, many organizations delegate breach response to their IT Departments. But while IT recovery is clearly critical, it’s only one component of effective breach response.

Senior managers (CEO, CFO, COO, CIO/CSO, etc.) are responsible for how their organization prepares for and responds to a cyber incident, regardless of whether the incident is a malicious ransomware attack or a data breach mishap.

Breach Plan Connect is a turnkey solution licensed by companies, municipalities, and nonprofits as a breach response roadmap for senior managers. It comes pre-loaded with a best-practices breach response plan that can be easily adapted to suit any business size, sector, model, and operation.

This app makes it possible for senior managers to access their breach response plan 24x7 and communicate securely even if their systems have been locked by ransomware or otherwise compromised.
If a breach occurs, senior managers and other designated individuals from the victimized organization can use this app to contact their internal and third-party response teams, including legal counsel and the claims department of their cyber insurer.

The app includes:

Automatic sync to cloud-based breach response plan so information is always up to date
Quick reference checklist for responding to any type of cyber incident
Complete plan, including detailed response protocols and procedures
Contact information of all colleagues on the incident response team
Contact information of all third-party resources, such as legal counsel and your cyber insurance claims department