
You can contact the search engines to ensure that they don’t archive personal information posted in error. Be aware that internet search engines store, or “cache,” information for a period of time.


Remove improperly posted information from the web. If a hacker stole credentials, your system will remain vulnerable until you change those credentials, even if you’ve removed the hacker’s tools. In addition, update credentials and passwords of authorized users. If possible, put clean machines online in place of affected ones. Closely monitor all entry and exit points, especially those involved in the breach. Take all affected equipment offline immediately - but don’t turn any machines off until the forensic experts arrive. They can advise you on federal and state laws that may be implicated by a breach. Then, you may consider hiring outside legal counsel with privacy and data security expertise. They will capture forensic images of affected systems, collect and analyze evidence, and outline remediation steps. Consider hiring independent forensic investigators to help you determine the source and scope of the breach. Depending on the size and nature of your company, they may include forensics, legal, information security, information technology, operations, human resources, communications, investor relations, and management. The exact steps to take depend on the nature of the breach and the structure of your business.Īssemble a team of experts to conduct a comprehensive breach response. Mobilize your breach response team right away to prevent additional data loss. Ask your forensics experts and law enforcement when it is reasonable to resume regular operations. Lock them and change access codes, if needed. Secure physical areas potentially related to the breach.The only thing worse than a data breach is multiple data breaches. Move quickly to secure your systems and fix vulnerabilities that may have caused the breach. What steps should you take and whom should you contact if personal information may have been exposed? Although the answers vary from case to case, the following guidance from the Federal Trade Commission (FTC) can help you make smart, sound decisions.

Whether hackers took personal information from your corporate server, an insider stole customer information, or information was inadvertently exposed on your company’s website, you are probably wondering what to do next. You just learned that your business experienced a data breach.

