{"id":8641,"date":"2021-10-26T02:38:17","date_gmt":"2021-10-26T01:38:17","guid":{"rendered":"https:\/\/intelliworx.wpenginepowered.com\/uk\/?p=6927"},"modified":"2025-08-06T03:16:35","modified_gmt":"2025-08-06T03:16:35","slug":"steps-to-manage-a-data-breach","status":"publish","type":"post","link":"https:\/\/intelliworx.co\/uk\/blog\/steps-to-manage-a-data-breach\/","title":{"rendered":"Steps To Manage A Data Breach"},"content":{"rendered":"<p>In today\u2019s world of increasing reliance on digital technology, data breaches are a reality. Organisations of all sizes are at risk of data breaches either by malicious attack or internal errors. Every day in the UK, small to medium businesses are targeted every 19 seconds and <a href=\"https:\/\/www.vmware.com\/security\/threat-research.html\" target=\"_blank\" rel=\"noopener\">88% of UK companies have suffered breaches in the last 12 months<\/a>.<\/p>\n<p>In 2020, EasyJet suffered a cybersecurity attack that affected nine million of their customers. Nearly all of the customer data compromised was email and travel itinerary information, as well as the details of 2000 credit cards.<\/p>\n<p>The damage of a data breach can be devastating to a company, no matter the size. It is imperative organisations know what steps to take to manage a data breach.<\/p>\n<h2>What is a data breach?<\/h2>\n<p>A data breach is a security incident where unauthorised individuals gain access to private and sensitive data. Most commonly, this is when hackers find a way into a database and access data, then copy or use it in some way.<\/p>\n<p>Data breaches end up exposing sensitive information such as personal data, financial information (e.g. credit card information), intellectual property, software codes, customer details, corporate or government data.<\/p>\n<p>After a data breach, attackers may impersonate someone from a targeted organisation and gain access to secure networks. Regulatory compliance can be violated, resulting in the organisation facing legal fines.<\/p>\n<h2>Why do data breaches happen?<\/h2>\n<p>Data breaches can be a serious issue and can happen for all sorts of reasons, including accidental leaks, targeted attacks, or even insider misuse. Data breaches can cause a lot of damage &#8211; for example, sensitive information leaks could jeopardise the organization&#8217;s reputation and enable hackers to steal from the company or use that sensitive information against them. They can also happen accidentally, or due to neglect of critical security systems.<\/p>\n<p>The most common scenario is cybercriminals gaining access to private networks with the intention of stealing data for financial reasons or with the intent to harm an organisation. The problem with these types of breaches is they can go undetected for a long time. This makes the attack and infiltration much worse because it could be happening right now, and we don&#8217;t even know about it.<\/p>\n<h2><\/h2>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-6931\" src=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2021\/10\/Steps-manage-data-breach_1.jpg\" alt=\"person sitting on a window view &amp; working on their laptop\" width=\"800\" height=\"250\" srcset=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2021\/10\/Steps-manage-data-breach_1.jpg 800w, https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2021\/10\/Steps-manage-data-breach_1-300x94.jpg 300w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<h2>How do data breaches happen?<\/h2>\n<p>Several fairly common factors allow for data breaches to happen, such as:<\/p>\n<ul>\n<li><strong>Human error<\/strong> is the <a href=\"https:\/\/connect.comptia.org\/content\/research\/trends-in-information-security-study\" target=\"_blank\" rel=\"noopener\">number one cause of data breaches<\/a>. They can happen due to lost or stolen documents, unencrypted hardware being lost, shared account information being given out, or emailing the wrong person.<\/li>\n<li><strong>Weak passwords<\/strong> are a no-fail entry point for hackers who try to access your network. <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener\">Brute force attacks are one of the five leading causes of data breaches<\/a>.<\/li>\n<li><strong>Legacy system vulnerabilities<\/strong> such as out of date software or unpatched security systems are an open door for attackers to leverage<\/li>\n<li><strong>Malware<\/strong> is downloaded after users are victims of phishing attacks, where they\u2019re sent emails purporting to be from known or reputable contacts. Or, users have connected to public wireless networks and credentials are captured.<\/li>\n<li><strong>Supply chain attacks <\/strong>occur when another organisation is attacked to gain access or disrupt a larger target business. Smaller enterprises don\u2019t always have the same security level as larger businesses and can be easier to infiltrate. This often happens when partners don\u2019t have the same level of security and don&#8217;t enforce policies with third-party suppliers.<\/li>\n<\/ul>\n<h2>What are the key steps to manage a data breach?<\/h2>\n<p>It&#8217;s an unfortunate reality that cyberattacks are on the rise and are predicted to increase in the future. One of the most important things organisations can do in order to protect their business from a data breach is to be prepared. This means having an incident response plan in place, so all employees know what to do and what not to do.<\/p>\n<p>This plan should specify what all employees are obliged to do when there is a data breach, whether they are internal or external staff. It should also include contact information for internal bodies that deal with these cases.<\/p>\n<p>Here&#8217;s some steps that should be included in an incident response plan to manage a data breach:<\/p>\n<h2>Stop and contain the breach<\/h2>\n<p>Once a company has been notified of a potential or actual breach, the first step is to contain it as quickly as possible. Time is of the essence and there should be no delay in initiating the incident response plan.<\/p>\n<p>Data breach prevention and management is the responsibility of the security incident team, and their role will be to decide the best way to contain the breach depending on the type of attack and the systems affected.<\/p>\n<p>Usually this is to isolate the affected areas of the system, so the rest of the organisation isn\u2019t affected. Things that can be done to contain a breach include:<\/p>\n<ul>\n<li>Disconnect from the internet<\/li>\n<li>Disable breached user accounts<\/li>\n<li>Disable remote access capability<\/li>\n<li>Change access control credentials<\/li>\n<li>Safeguard firewall settings and logs, systems and security logs<\/li>\n<\/ul>\n<p>It\u2019s tempting to want to delete and fix immediately after a data breach, but the important thing is to begin implementing the incident response plan and containing the breach.<\/p>\n<h2><\/h2>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-8827\" src=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2021\/10\/Steps-manage-data-breach_2.jpg\" alt=\"it person pointing something on the laptop\" width=\"800\" height=\"250\" srcset=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2021\/10\/Steps-manage-data-breach_2.jpg 800w, https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2021\/10\/Steps-manage-data-breach_2-300x94.jpg 300w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<h2>Gather and preserve evidence of the breach<\/h2>\n<p>While it can be tempting to try and fix a breach as soon as it\u2019s occurred, it\u2019s important not to delete or erase data that will be needed for forensic investigators. The security team will need to document all the details of what\u2019s happened and their actions to contain the breach. All this information is used to determine what led to the breach, who was responsible, and <a href=\"https:\/\/intelliworx.co\/uk\/managed-security\/\">recommendations for future security<\/a> needed.<\/p>\n<p>It&#8217;s vital to know how the attack happened in order to prevent future attacks. It\u2019s also important to investigate any affected systems so any malware the attacker may have left behind can be removed.<\/p>\n<p>It also informs companies about the actions to take regarding informing other potentially affected businesses.<\/p>\n<p>So, remember when dealing with a breach:<\/p>\n<ul>\n<li>Don\u2019t panic and make hasty decisions<\/li>\n<li>Follow your incident response plan<\/li>\n<li>Do not wipe and reinstall any systems until evidence is collated.<\/li>\n<\/ul>\n<h2>Communication about the breach<\/h2>\n<p>The information gathered about the breach will inform legal and compliance teams about the best way to notify the public, customers and relevant supervisory authorities. Legislated mandatory timeframes for reporting a breach may be required, so it is important businesses are aware of this to avoid fines.<\/p>\n<p>For example, the UK\u2019s <a href=\"https:\/\/www.legislation.gov.uk\/ukpga\/2018\/12\/contents\/enacted\" target=\"_blank\" rel=\"noopener\">Data Protection Act of 2018<\/a> requires data breach notification to be made to the ICO within 72 hours of the breach being noticed.<\/p>\n<p>Ensure employees don\u2019t announce any information about breaches before an official statement is made by management. Customers and the public should also be informed of the date of the breach, what data has been compromised, and any protective actions that can be taken against further damage. This helps organisations maintain their integrity and credibility despite the aftermath that will go with a data breach.<\/p>\n<h2>Perform a security systems audit<\/h2>\n<p>After a security breach, it\u2019s recommended to do an audit of the business systems to check on the state of current cybersecurity and plan for future disasters. A security audit might involve penetration testing, which is a simulated attack against systems to check for exploitable vulnerabilities.<\/p>\n<p>Security audits are important to do regularly, not just post-data breach. Post-breach audits are different from routine audits, as they\u2019re risk assessment checks as well as checking for current potential threats. Security teams can take the information gathered from the investigation of the data breach and perform a thorough audit to map out any vulnerabilities and plan more robust security prevention and management.<\/p>\n<p>The <a href=\"https:\/\/intelliworx.co\/uk\/managed-it-services\/\">managed IT services team at INTELLIWORX<\/a> knows how to help businesses close security gaps and avoid data breaches. <a href=\"https:\/\/intelliworx.co\/uk\/contact\/\">Get in touch with the experts today<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn essential steps to effectively manage a data breach. Protect your organization and respond swiftly to security incidents.<\/p>\n","protected":false},"author":7,"featured_media":8897,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[204,49,29],"tags":[67,36],"class_list":["post-8641","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-disaster-recovery","category-security","tag-disaster-recovery","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Steps To Manage A Data Breach - Intelliworx<\/title>\n<meta name=\"description\" content=\"Learn essential steps to effectively manage a data breach. Protect your organization and respond swiftly to security incidents.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/intelliworx.co\/uk\/blog\/steps-to-manage-a-data-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Steps To Manage A Data Breach - Intelliworx\" \/>\n<meta property=\"og:description\" content=\"Learn essential steps to effectively manage a data breach. Protect your organization and respond swiftly to security incidents.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/intelliworx.co\/uk\/blog\/steps-to-manage-a-data-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"Intelliworx\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/IntelliworxGlobal\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-26T01:38:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-06T03:16:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2021\/10\/Steps-manage-data-breach_banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1919\" \/>\n\t<meta property=\"og:image:height\" content=\"777\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Shane Maher\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shane Maher\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Steps To Manage A Data Breach - Intelliworx","description":"Learn essential steps to effectively manage a data breach. Protect your organization and respond swiftly to security incidents.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/intelliworx.co\/uk\/blog\/steps-to-manage-a-data-breach\/","og_locale":"en_US","og_type":"article","og_title":"Steps To Manage A Data Breach - Intelliworx","og_description":"Learn essential steps to effectively manage a data breach. Protect your organization and respond swiftly to security incidents.","og_url":"https:\/\/intelliworx.co\/uk\/blog\/steps-to-manage-a-data-breach\/","og_site_name":"Intelliworx","article_publisher":"https:\/\/www.facebook.com\/IntelliworxGlobal","article_published_time":"2021-10-26T01:38:17+00:00","article_modified_time":"2025-08-06T03:16:35+00:00","og_image":[{"width":1919,"height":777,"url":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2021\/10\/Steps-manage-data-breach_banner.jpg","type":"image\/jpeg"}],"author":"Shane Maher","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Shane Maher","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/intelliworx.co\/uk\/blog\/steps-to-manage-a-data-breach\/#article","isPartOf":{"@id":"https:\/\/intelliworx.co\/uk\/blog\/steps-to-manage-a-data-breach\/"},"author":{"name":"Shane Maher","@id":"https:\/\/intelliworx.co\/uk\/#\/schema\/person\/fcdcafd2949da93c85db26bfe5ea13bb"},"headline":"Steps To Manage A Data Breach","datePublished":"2021-10-26T01:38:17+00:00","dateModified":"2025-08-06T03:16:35+00:00","mainEntityOfPage":{"@id":"https:\/\/intelliworx.co\/uk\/blog\/steps-to-manage-a-data-breach\/"},"wordCount":1309,"commentCount":1,"publisher":{"@id":"https:\/\/intelliworx.co\/uk\/#organization"},"image":{"@id":"https:\/\/intelliworx.co\/uk\/blog\/steps-to-manage-a-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2021\/10\/Steps-manage-data-breach_banner.jpg","keywords":["Disaster Recovery","Security"],"articleSection":["Blog","Disaster Recovery","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/intelliworx.co\/uk\/blog\/steps-to-manage-a-data-breach\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/intelliworx.co\/uk\/blog\/steps-to-manage-a-data-breach\/","url":"https:\/\/intelliworx.co\/uk\/blog\/steps-to-manage-a-data-breach\/","name":"Steps To Manage A Data Breach - Intelliworx","isPartOf":{"@id":"https:\/\/intelliworx.co\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/intelliworx.co\/uk\/blog\/steps-to-manage-a-data-breach\/#primaryimage"},"image":{"@id":"https:\/\/intelliworx.co\/uk\/blog\/steps-to-manage-a-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2021\/10\/Steps-manage-data-breach_banner.jpg","datePublished":"2021-10-26T01:38:17+00:00","dateModified":"2025-08-06T03:16:35+00:00","description":"Learn essential steps to effectively manage a data breach. Protect your organization and respond swiftly to security incidents.","breadcrumb":{"@id":"https:\/\/intelliworx.co\/uk\/blog\/steps-to-manage-a-data-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/intelliworx.co\/uk\/blog\/steps-to-manage-a-data-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/intelliworx.co\/uk\/blog\/steps-to-manage-a-data-breach\/#primaryimage","url":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2021\/10\/Steps-manage-data-breach_banner.jpg","contentUrl":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2021\/10\/Steps-manage-data-breach_banner.jpg","width":1919,"height":777,"caption":"office collague thinking seriously in meeting room about data breach"},{"@type":"BreadcrumbList","@id":"https:\/\/intelliworx.co\/uk\/blog\/steps-to-manage-a-data-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/intelliworx.co\/uk\/"},{"@type":"ListItem","position":2,"name":"Steps To Manage A Data Breach"}]},{"@type":"WebSite","@id":"https:\/\/intelliworx.co\/uk\/#website","url":"https:\/\/intelliworx.co\/uk\/","name":"Intelliworx","description":"Managed IT Services","publisher":{"@id":"https:\/\/intelliworx.co\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/intelliworx.co\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/intelliworx.co\/uk\/#organization","name":"Intelliworx","alternateName":"INTELLIWORX","url":"https:\/\/intelliworx.co\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/intelliworx.co\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2021\/07\/INX-Logo-colour.png","contentUrl":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2021\/07\/INX-Logo-colour.png","width":600,"height":90,"caption":"Intelliworx"},"image":{"@id":"https:\/\/intelliworx.co\/uk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/IntelliworxGlobal","https:\/\/www.linkedin.com\/company\/intelliworx\/"]},{"@type":"Person","@id":"https:\/\/intelliworx.co\/uk\/#\/schema\/person\/fcdcafd2949da93c85db26bfe5ea13bb","name":"Shane Maher","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2023\/12\/Maher_Shane_901-02229_Web-Retouched-96x96.jpg","url":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2023\/12\/Maher_Shane_901-02229_Web-Retouched-96x96.jpg","contentUrl":"https:\/\/intelliworx.co\/uk\/wp-content\/uploads\/sites\/6\/2023\/12\/Maher_Shane_901-02229_Web-Retouched-96x96.jpg","caption":"Shane Maher"},"description":"Shane Maher is the Managing Director at Intelliworx, responsible for providing overall business direction and supporting businesses in their digital transformation journey. Shane specialises in empowering businesses by providing comprehensive IT support and developing cutting-edge infrastructure solutions. His expertise lies in guiding MSPs through the transition to cloud services, leveraging the power of cloud technologies to enhance business operations. Shane's passion for supporting businesses' IT infrastructure and his extensive knowledge in cloud computing make him a valuable asset in driving successful digital transformations. With his wealth of knowledge and experience, he is committed to driving IT success for clients and helping them navigate the evolving technological landscape.","sameAs":["https:\/\/www.linkedin.com\/in\/shane-maher-ab92ba23\/"],"url":"https:\/\/intelliworx.co\/uk\/author\/shaneinx\/"}]}},"_links":{"self":[{"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/posts\/8641","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/comments?post=8641"}],"version-history":[{"count":0,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/posts\/8641\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/media\/8897"}],"wp:attachment":[{"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/media?parent=8641"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/categories?post=8641"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/intelliworx.co\/uk\/wp-json\/wp\/v2\/tags?post=8641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}