Gartner has laid out a blueprint for firms affected by the terrorist attacks on the US. The analyst has also temporarily opened up all its core research to non-subscribers.
The company's advice includes ensuring that businesses protect themselves against possible secondary cyber attacks.
Firms should implement their cyber incident response plan if they have one. If they do not, Gartner recommends blocking all external internet access until it is certain that a wave of cyber-terrorism attacks is not about to follow.
The analysts also warned financial service providers (FSPs) to plan against market manipulation.
In a research note analyst Terry Allan Hicks said: "After attending to the most essential task - assessing the human costs of the event, and ensuring that employees and their families are offered any possible assistance - FSPs should take steps to begin their recovery and ensure the continuity of their operations."
Gartner recommends assembling key staff, preferably virtually in dispersed locations, to ensure that recovery plans can be developed and executed.
Also important is assessing who can take over the operational responsibilities of those affected by the attack, and holding similar talks with peer enterprises which, in the short term, can help support business operations as well as mitigate the market effects of this event, as permitted by law.
Hicks writes: "Nonetheless, FSPs should be concerned with the continuing human and operational effects of these events, and with the possibility that they are only the first wave of attacks. FSPs should also be concerned about the possibility of a wave of cyber-terrorist attacks, and about market manipulation - whether premeditated or opportunistic - following these events.
"The most important measures FSPs can take under these circumstances will be to restore effective communication and sound management. FSPs should also plan for further human and organisational issues as a result of such attacks."
Gartner also advised firms to check and update their human resources records for emergency contact details and to issue updates on the steps they are taking.
Would you settle for door locks or invest in a burglar alarm too?
Australian government to require technology and communications companies to provide access to messages
New bill avoids demanding 'backdoors' in encryption, but includes measures to compel companies to provide access to encrypted communications
Indonesian overclocker Ivan Cupa (with the aid of a lot of liquid nitrogen) achieves record overclock on AMD's latest Threadripper
Ssupermassive black hole is so big it corresponds to four per cent of the galaxy's total mass