YOU’VE BEEN HACKED! SPREAD THE WORD

No matter how prepared you are – or believe you are – you can still suffer a cyber-security breach. What you do next can have a profound impact on the reputation of the business, customer loyalty, employee morale, and, ultimately, your bottom line.

An effective communication strategy should follow these guidelines:

  1. Notify key regulatory and legal authorities as soon as possible, unless this might impede a criminal investigation. Even if notification isn’t required by law, it’s an important courtesy.
  2. Make sure that staff roles and responsibilities for communicating the breach are outlined and understood clearly.
  3. Tailor the notification process to the audience – high-value customers, senior employees, or individuals who might particularly vulnerable (such as the elderly, the disabled, and minors) and to the nature of the breach; handle the theft of confidential client information differently than stealing employees' Social Security numbers.
  4. Have legal counsel review the method and content of all communications.
  5. Prepare for media inquiries to deliver a clear message for parties affected directly or indirectly. Be sure that your spokesperson is qualified and trained to deal with the media.
  6. Provide ways for victims of the breach to ask additional questions and/or learn how to minimize potential harm.
  7. Test the plan: If you had to execute it, how well did it work, and how did you update it? Many businesses have discovered holes in their response plans after failing to consider the impact of a cyber security breach on daily operations, or underestimating the attention the event drew.

To learn more about spreading the word after a data breach, please get in touch with us.

Need insurance for You, Your Family or Your Business?
We can match you to a qualified, local insurance expert!
Further Reading
Hackers breach dozens of business web sites every day – and too many of these break-ins remain undetected due to the sophistication of the attacks and/or a lack of cybersecurity awareness among the victims. Once you realize that bad guys have hacked...
If you can plug it into a wall, you can hack it. The question is not so much whether or not industrial robotics and so on can be hacked, but under what circumstances, and whether or not it's a serious threat. Something worth acknowledging up front...
By Steve Strauss, senior USA TODAY Small Business Columnist My dad always called himself "the world's greatest salesman." Was he? No, probably not. But what I can say is that he was one of the great marketers. ...
OSHA's "Interim Enforcement Procedures" Prioritize Its Responses to Reported Accidents, Calling for Inspections in Some Cases and Submission of the Employer's Own Accident Investigation Report in Others   ...
SAFETY TRAINING: A WORD TO THE WISE This real-life case reinforces the need for every business to provide OSHA-required training. A West Virginia company assigned a new employee – call him Jim – to drive a forklift, even though he had no experienc...