Skip to main content

6 Must-Dos for Handling a Data Breach

You prepared your best.

Hardened security, trained employees, locked things down.

But it still happened – a cyberattack that compromised private data.

Don’t freeze up! Execute the plan to minimize damages.

Follow these six key steps when responding to any breach.

Pull the Plug

Isolate compromised systems immediately to prevent further exposure.

Shut off affected devices, change passwords, disable accounts, etc.

Time is of the essence.

Call in the Experts

Don’t go it alone.

The help of cybersecurity pros lowers costs and better protects all parties.

Tech experts stop the bleeding while legal specialists address compliance duties.

Notify Individuals Impacted

Regulations often require informing people whose personal information was exposed.

Pull this data and craft notifications.

Offer credit monitoring if identities are at risk.

Review Liabilities

Assess potential legal liabilities, insurance coverage options, fines, lawsuits, and damages.

Forecast a realistic worst-case financial scenario.

Tighten Up Defenses

Plug the security gaps that allowed the breach.

Eliminate vulnerabilities, improve monitoring/prevention protocols and tools, and retrain staff on threats.

Document Everything

Thoroughly log incident details, response playbooks followed, costs incurred, and outcomes.

Documenting the event provides accountability.

Staying resilient when hackers strike takes planning and diligence.

Don’t sit back once notified of an intrusion. Launch into a practiced response protocol like this to emerge stronger and smarter.