6 Must-Dos for Handling a Data Breach
You prepared your best.
Hardened security, trained employees, locked things down.
But it still happened – a cyberattack that compromised private data.
Don’t freeze up! Execute the plan to minimize damages.
Follow these six key steps when responding to any breach.
Pull the Plug
Isolate compromised systems immediately to prevent further exposure.
Shut off affected devices, change passwords, disable accounts, etc.
Time is of the essence.
Call in the Experts
Don’t go it alone.
The help of cybersecurity pros lowers costs and better protects all parties.
Tech experts stop the bleeding while legal specialists address compliance duties.
Notify Individuals Impacted
Regulations often require informing people whose personal information was exposed.
Pull this data and craft notifications.
Offer credit monitoring if identities are at risk.
Review Liabilities
Assess potential legal liabilities, insurance coverage options, fines, lawsuits, and damages.
Forecast a realistic worst-case financial scenario.
Tighten Up Defenses
Plug the security gaps that allowed the breach.
Eliminate vulnerabilities, improve monitoring/prevention protocols and tools, and retrain staff on threats.
Document Everything
Thoroughly log incident details, response playbooks followed, costs incurred, and outcomes.
Documenting the event provides accountability.
Staying resilient when hackers strike takes planning and diligence.
Don’t sit back once notified of an intrusion. Launch into a practiced response protocol like this to emerge stronger and smarter.