KPM

Assessing Customer Credit QBI Deduction Cash Withdrawal Small business retirement Spouse travel expenses Accounting Software Strategic Planning Process Insurance Schemes Enterprise Risk Management Program Account-Based Marketing Wrong Software For Your Organization Operational Review Internal Benchmarking Reports Sales approach Capturing Data Older Workers Pooled Employer Plans Financial Statement Options BOI Reporting Rules Privileged Users Medicare Premiums DOL Business valuation Trust Fund Recovery Penalty Value-Based Sales Fringe Benefits Green Lease Strategic Planning Financial Reporting Marketing Strategy Succession planning health care benefits Cyberinsurance PTO Buying Media Screening Pipeline Management Billing Best Practices Solo 401(k)

Responding to The Nightmare of a Data Breach

It is every business owner’s nightmare. Should hackers gain access to your customers’ or employees’ sensitive data, the very reputation of your company could be compromised. And lawsuits might soon follow.

No business owner wants to think about such a crisis, yet it is imperative that you do. Suffering a data breach without an emergency response plan leaves you vulnerable to not only the damage of the attack itself but also the potential fallout from your own panicked decisions.

Five steps to take

A comprehensive plan generally follows five steps once a data breach occurs:

  1. Call your attorney. They should be able to advise you on the potential legal ramifications of the incident and what you should do or not do (or say) in response. Involve your attorney in the creation of your response plan, so all this will not come out of the blue.
  2. Engage a digital forensics investigator. Contact us for help identifying a forensic investigator that you can turn to in the event of a data breach. The preliminary goal will be to answer two fundamental questions: How were the systems breached, and what data did the hackers access? Once these questions have been answered, experts can evaluate the extent of the damage.
  3. Fortify your information technology (IT) systems. While investigative and response procedures are underway, you need to proactively prevent another breach and strengthen controls. Doing so will obviously involve changing passwords, but you also may need to add firewalls, create deeper layers of user authentication, or restrict some employees from certain systems.
  4. Communicate strategically. No matter the size of the company, the communications goal following a data breach is essentially the same: provide accurate information about the incident in a reasonably timely manner that preserves the trust of customers, employees, investors, creditors, and other stakeholders.

Note that “in a reasonably timely manner” does not mean “immediately.” Often, it is best to acknowledge an incident occurred but hold off on a detailed statement until you know precisely what happened and can reassure those affected that you are taking specific measures to control the damage.

  1. Activate or adjust credit and IT monitoring services. You may want to initiate an early warning system against future breaches by setting up a credit monitoring service and engaging an IT consultant to periodically check your systems for unauthorized or suspicious activity. Of course, you do not have to wait for a breach to do these things, but you could increase their intensity or frequency following an incident.

Inevitable risk

Data breaches are an inevitable risk of running a business in today’s networked, technology-driven world. Should this nightmare become a reality, a well-conceived emergency response plan can preserve your company’s goodwill and reduce the negative impact on profitability. We can help you budget for such a plan and establish internal controls to prevent and detect fraud related to (and not related to) data breaches.

Related Articles

Talk with the pros

Our CPAs and advisors are a great resource if you’re ready to learn even more.