What Would You Do in Response to a Breach?

What Would You Do in Response to a Breach?

While we—for reasons that should be obvious—tend to focus our attention on preventing and avoiding cybersecurity breaches, it is important that we address how your business responds to a successful breach attempt. Let’s go over how to create a data breach response plan.

First, it is important that we understand what a data breach response plan is.

A Data Breach Response Plan is a Field Guide to Business Continuity

That’s really what it all boils down to—a data breach response plan is simply a collection of strategies that you’ll need to follow to mitigate the worst impacts of this data breach. Your response plan should specify the following:

  • The definition you use to describe what qualifies as a breach
  • The internal procedures used to share news of the breach
  • The contact details for each member of the team responsible for dealing with the breach
  • The procedures to identify the cause of the breach, to isolate all impacted systems, and to notify all required parties
  • The list of reparations to be made to those whose data was impacted, like identity theft protections and credit monitoring

Having this plan prepared can help you eliminate many of the high costs otherwise associated with breach response and management, while also helping you preserve your reputation and your business’ all-important uptime.

The Steps of Data Breach Response Development

1. Identify Potential Vulnerabilities

If you want your breach response to be effective, you need to have an idea of what might lead to your business’ data being breached—employee error or intent, data loss of all kinds, disruption of service—while also considering the outcomes, like a hit to your business’ reputation and legal ramifications.

2. Assign Roles for Your Team Members

Responding to a data breach needs to be an all-hands-on-deck situation, with people in all positions playing a part. Documenting the responsibilities of each team and department in your response plan will maintain transparency.

3. Have Assorted Protections in Place

As we always recommend, there is an assortment of security solutions needed to keep as many threats as possible out of your network. Ensuring your team is compliant to stringent password policies, maintaining redundant copies of your data in both on- and off-site storage solutions, and a variety of other safeguards will be critical to your success.

4. Establish Processes

From identifying that there is an issue and what caused it to communicating amongst the team to isolate and remove it, you need to have established processes that have been tested to be effective. You also have to ensure that you have a list of all parties that need to be notified after a breach takes place—government entities, business associates, and the media, if need be.

5. Review and Adjust

Finally, you need to consider your breach response protocol to be a living process. With threats constantly evolving and advancing, you need to evaluate how effective your breach response tactics are and improve them periodically.

We Can Help You Establish a Response for Data Breaches… Or, Ideally, Prevent Them

Don’t just trust that you won’t be targeted. Reach out at 603-889-0800 to find out more about our services.

Related Posts

Businesses today have to deal with more potential problems than in any time in history. They are dealing with cost increases at every turn, personnel shortages, and a regulatory landscape that is always evolving. One of the biggest issues that can ha...
Security is an incredibly important part of running a business, but it’s extremely easy for busy employees to fall short of the security expectations you might place on them. This is why it is so important to train your employees on the many facets o...
It’s almost summer, which means baseball is in full swing. The game that many of us grew up on has recently gone through a major shift; one that small business owners can replicate to help their organizations. It came about through the use of data an...
Due to the increasing complexity and rapid growth of the cybersecurity industry, businesses need to stay ahead of developing threats designed to undermine advancements in the latest and greatest security technologies. One way that researchers have us...
How many security solutions does your organization have implemented at any given time? Traditionally, businesses have implemented what we call “point solutions,” which are software tools designed to address a specific part of your security infrastruc...
Your company’s email is one of its most important pieces of technology, and since that is true for nearly every business, it is unfortunately one of the most utilized attack vectors used by cybercriminals. Most businesses don’t understand just how vu...
With many people continuing to work remotely to some extent, it would be irresponsible not to acknowledge that remote work can introduce a level of risk to an organization’s cybersecurity. This makes it all the more important that this security is lo...
While protecting the credit card data you collect from your customers and clients is obviously important, you likely also have a line of credit for your business’ use that you need to think about as well. Let’s turn our focus to that card for a momen...
Google Workspace is a great tool that allows you to get a lot done, but sometimes you might find yourself in a position where you need to download the files and take them with you or send them to someone. In these cases, you might not want to share t...
Data breaches—any event where a business’ confidential data is viewed, copied, or stolen by an unauthorized person or party—are a serious problem. Unfortunately, they are also a serious problem that can be caused by no shortage of situations. Let’s r...
When you go to such great lengths to protect your business’ network, it can come as quite a shock when you experience a data breach. Surely someone has to be at blame for such an event, right? Unfortunately, this mindset is often one that can come as...
Tomorrow, March 31st, is the official World Backup Day, a day intended to remind us all of the importance of taking backups for the sake of data continuity. While this kind of day can be a valuable reminder of a critical best practice, we contend tha...

Onsite Service Coverage Area

Although we provide remote services and support to businesses in over 20 states, onsite services are limited to within reasonable driving distance from our offices in NH.  We will manage a local vendor for locations outside of our service area to provide onsite assistance when needed.


Onsite Computer Support Services are available to businesses within 60 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH, and then down into Boston. From Northern and Central Mass, we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

White Mountain IT Services


33 Main St, Suite 302
Nashua, NH 03064


121 Riverfront Drive
Manchester, NH 03102


Client Help Desk


Open Positions