{"id":36508,"date":"2020-07-28T03:31:03","date_gmt":"2020-07-28T07:31:03","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=36508"},"modified":"2020-11-09T04:24:05","modified_gmt":"2020-11-09T09:24:05","slug":"how-to-data-breach","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/how-to-data-breach\/36508\/","title":{"rendered":"Infographic: Five vital steps to deal with a data breach"},"content":{"rendered":"<p>Things can be frantic when you\u2019re dealing with a data breach. While swiftly diagnosing the problem and communicating clearly with everyone who needs to know, it\u2019s easy to miss something that could have serious consequences later. Use these five pointers to make sure you\u2019ve done the right thing after a data breach.<br>\n<img decoding=\"async\" class=\"aligncenter size-full wp-image-36624\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2020\/07\/31102614\/data-breach-test-10Mb-2.gif\" alt=\"\" width=\"600\" height=\"1019\"><\/p>\n<h2>1.\u00a0 Assess the situation<\/h2>\n<p>First, assess the data breach\u2019s risk to customers. Risk assessment lets you decide the next steps, including <a href=\"https:\/\/www.dataprotection.ie\/sites\/default\/files\/uploads\/2019-10\/Data%20Breach%20Notification_Practical%20Guidance_Oct19.pdf\" target=\"_blank\" rel=\"noopener nofollow\">whether to report the breach<\/a>. If it\u2019s a high risk to customers, you must inform them without undue delay, perhaps even before reporting to authorities.<\/p>\n<h2>2.\u00a0 Be transparent and helpful<\/h2>\n<p>Don\u2019t try to cover up the breach or hide details from those affected. If you hide things, you may see <a href=\"https:\/\/www.thehaguesecuritydelta.com\/media\/com_hsd\/report\/278\/document\/2020-ciso-benchmark-cybersecurity-series-feb-2020.pdf\" target=\"_blank\" rel=\"noopener nofollow\">customers losing trust in your business on top of negative news coverage<\/a>. When you tell customers what happened, give them advice on what to do next.<\/p>\n<h2>3.\u00a0 Document everything<\/h2>\n<p><a href=\"https:\/\/ico.org.uk\/for-organisations\/guide-to-data-protection\/guide-to-the-general-data-protection-regulation-gdpr\/personal-data-breaches\/\" target=\"_blank\" rel=\"noopener nofollow\">Document every data breach<\/a>, even if you don\u2019t have to report it. Record what happened, the steps you took and why the breach was reported or not reported.<\/p>\n<h2>4.\u00a0 Learn from it<\/h2>\n<p>Once you identify the cause, fix it. Next, make sure all staff receive training in how to prevent future breaches. <a href=\"https:\/\/www.techradar.com\/news\/90-percent-of-data-breaches-are-caused-by-human-error\" target=\"_blank\" rel=\"noopener nofollow\">Human error causes most data breaches<\/a>.<\/p>\n<h2>5.\u00a0 Make sure you notify everyone affected<\/h2>\n<p>If you\u2019re processing data for other organizations, <a href=\"https:\/\/www.ftc.gov\/tips-advice\/business-center\/guidance\/data-breach-response-guide-business\" target=\"_blank\" rel=\"noopener nofollow\">don\u2019t forget to tell them about the breach<\/a>. They will have steps they must take too.<\/p>\n<p>Using these five pointers after a data breach will help your business get back on its feet sooner rather than later. Communicating swiftly and clearly with customers and partners is all-important in limiting the breach\u2019s impact on your business. It may happen to even the most cybersecurity-conscious organizations, but there\u2019s still a lot you can do to prepare. Equipping your employees with cybersecurity skills and knowledge is crucial to ensuring your customers\u2019 data stays safe in future.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Despite everything we do to prevent them, data breaches happen to the best of us. If it happens, check you\u2019ve done these five things.<\/p>\n","protected":false},"author":2602,"featured_media":36509,"template":"","coauthors":[3835],"class_list":{"0":"post-36508","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-data-and-privacy","7":"emagazine-category-data-breaches","8":"emagazine-category-scale-your-business-business","9":"emagazine-tag-data-breaches"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/how-to-data-breach\/36508\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-futures-magazine\/how-to-data-breach\/22919\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/secure-futures-magazine\/how-to-data-breach\/21111\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/36508","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2602"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/36509"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=36508"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=36508"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}