Recovering from a Data Breach
Many experts believe that you don't always know that your data has been breached and only learn about it after the fact, often from a third party. When you do find out about a breach, do you know what to do to recover from it? This week's articles provide some insights in the steps to take to save your reputation.
Legal and technology experts shared their insights on how to best recover from a small business data breach.
What should you do if your business experiences a data breach?
are some ways to deal with the different aspects of a data breach and how a company can recover.
Security experts share the steps that CIOs and CISOs should take in the hours and days after a breach.
You already know a data breach is bad news for everyone, consumers and the breached business alike, but you might be shocked to learn just how severe the reputational impact can be for businesses.
The hours, days, weeks and even months after your organization has been the target of a data breach can feel like the company's darkest time.
As always, I look forward to hearing about your concerns with regard to business continuity. If there are any topics that you'd like to see covered, email me at
Bob Mellinger, President
1. Have You Been Hacked? How to Recover from a Data Breach
It's every modern business's worst nightmare: You discover there's been a security breach, and your sensitive business and customer data has ended up in the hands of hackers. While business owners may have some safeguards in place, the reality is that a data breach can happen to anyone at any time, especially small businesses.
2. Six Steps for Data Breach Recovery and Prevention
Data breaches can occur in a number of ways (such as through hacking, phishing or physical theft) and it's unsettling to think about what could happen to stolen data if it falls into the wrong hands. What proactive measures should you take to minimize your risk of attack? You may not know the answers to these questions, but fear not, companies can protect themselves against threats.
3. Data Breaches: How to Deal with Them and Recover
The size of a company does not matter when it comes to data breaches as juggernauts like Target have had customer information hacked. The smaller a company is the larger an impact a hack can have as losing a few main clients can cripple cash flow in startups and small businesses. With more and more information being kept electronically it is inevitable that some businesses will encounter a hack that leads to the information of employees and/or customers being let into the hands of a hacker or hacker group.
4. Five Steps to Take When a Data Breach Hits
If the worst does happen -- say, hackers manage to break into a server and steal credit card numbers from a database -- it can be hard to know what to do next (other than panic). CIO.com spoke to several security and legal experts to find out what to do after a leak occurs. Here are their five steps for how to survive a data breach, in chronological order.
5. Best Practices for Companies Recovering from a Data Breach
A recent survey reveals how passionately consumers feel about data breaches, and it's a call to action for businesses to adopt some best practices to help consumers (and the companies) in recovering from a data breach. The majority of consumers believe companies should be required to provide protections to help them in recovering from a data breach. Nearly half of breach victims fear their identities will never be safe again, and -- perhaps most disheartening -- most of them feel that breached companies will be responsive to victims only if detailed media coverage pressures them to be, according to the survey.
6. Keeping Your Customers and Recovering Your Reputation after a Data Breach
The most trusted brand names have experienced lost customer trust, damaged employee morale and concerned stockholders. A recent survey found that 54% of companies believe it can take anywhere from 10 months to more than 2 years to restore a company's reputation following a data breach. The difference in recovery time isn't just about the size or scale of the breach; it also depends on how a company responds to the crisis.
Quote of the Week:
"Security breaches usually entail more recovery efforts than acts of God. Unlike proverbial lightning, breaches of security can be counted on to strike twice unless the route of compromise has been shut off."