{"id":26101,"date":"2017-02-07T15:42:45","date_gmt":"2017-02-07T19:42:45","guid":{"rendered":"http:\/\/www.andysowards.com\/blog\/?p=26101"},"modified":"2023-08-02T11:33:45","modified_gmt":"2023-08-02T15:33:45","slug":"5-steps-contain-data-security-breach-business","status":"publish","type":"post","link":"https:\/\/www.andysowards.com\/blog\/2017\/5-steps-contain-data-security-breach-business\/","title":{"rendered":"5 Steps To Contain Data Security Breach In Your Business"},"content":{"rendered":"<p>There is nothing scarier than the moment you realize your security has been breached and data stolen. Not only do you deal with the violation of your small business, you must deal with the legal ramifications and a tarnishing of your reputation. Many business owners are overwhelmed with what actions need to be taken to repair\u00a0damage and get back to \u2018business as usual\u2019. If you find yourself in this situation, here are some steps to consider towards rebuilding your business.<\/p>\n<h3>Contain and Make Changes<\/h3>\n<p><a href=\"http:\/\/www.pcworld.com\/article\/3109313\/security\/alleged-nsa-data-dump-contain-hacking-tools-rarely-seen.html\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-full wp-image-26112 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/security-alleged-nsa-data-dump-contain-hacking-tools-rarely-seen.jpg\" alt=\"security-alleged-nsa-data-dump-contain-hacking-tools-rarely-seen\" width=\"580\" height=\"453\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 580px; --smush-placeholder-aspect-ratio: 580\/453;\" \/><\/a><br \/>\n<em>Alleged NSA data dump contains powerful, rarely seen hacking tools<\/em><\/p>\n<p>If hackers have broken in, you want to minimize the damage as much as possible. Work with your in-house IT team to make immediate changes. If you don\u2019t have an in-house IT team, you can do some of these changes on your own. However, you will want to call in some IT specialists to help you with what you can\u2019t do to protect your data and keep the hackers out as best as possible. Some of the changes that need to happen are:<\/p>\n<ul>\n<li>Change all passwords<\/li>\n<li>Update firewalls<\/li>\n<li>Run virus scans to eliminate current and future threats<\/li>\n<\/ul>\n<h3>Bring in the Professionals<\/h3>\n<p><a href=\"https:\/\/digitalguardian.com\/blog\/data-breach-experts-share-most-important-next-step-you-should-take-after-data-breach-2014-2015\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"size-full wp-image-26105 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/databreach-2.jpg\" alt=\"34122525 - security concept on blue background with world map and social icons.\" width=\"835\" height=\"574\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/databreach-2.jpg 835w, https:\/\/www.andysowards.com\/blog\/assets\/databreach-2-768x528.jpg 768w\" data-sizes=\"(max-width: 835px) 100vw, 835px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 835px; --smush-placeholder-aspect-ratio: 835\/574;\" \/><\/a><br \/>\n<em>Data Breach Experts Share The Most Important Next Step You Should Take After A Data Breach in 2014 &#8211; 2015 &amp; Beyond<\/em><\/p>\n<p>It is vital to bring in the professionals to help you navigate the retrieval and future protections that will secure your business once again. Consider using a team that can help you with:<\/p>\n<ul>\n<li>Data recovery<\/li>\n<li>Forensic imaging<\/li>\n<li>Legal discovery<\/li>\n<\/ul>\n<p>Having a professional team devoted to these areas will save you lots of time and plenty of money in the future.<\/p>\n<h3>Alert Your Customer Base<\/h3>\n<p><a href=\"http:\/\/www.businessinsider.com\/how-to-inform-customers-of-a-data-breach-2011-7\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-full wp-image-26111 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/how-to-inform-customers-of-a-data-breach.jpg\" alt=\"how-to-inform-customers-of-a-data-breach\" width=\"640\" height=\"418\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 640px; --smush-placeholder-aspect-ratio: 640\/418;\" \/><\/a><br \/>\n<em>How To Inform Customers Of A Data Breach<\/em><\/p>\n<p>You don\u2019t want to have to admit that there has been a breach, but to protect your reputation you really should let all your customers know about the breach. While some will be upset, and you may lose some of your customer base, admitting the breach allows your customer base to do their own background checks to be sure they are still safe. Do let them know what your plan is to battling the breach and protecting their information in the future.<\/p>\n<h3>Plan for the Future<\/h3>\n<p><a href=\"http:\/\/www.cio.com.au\/article\/580908\/5-steps-respond-security-breach\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-full wp-image-26107 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/databreach-4.jpg\" alt=\"databreach 4\" width=\"600\" height=\"443\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 600px; --smush-placeholder-aspect-ratio: 600\/443;\" \/><\/a><br \/>\n<em>5 steps to respond to a security breach<\/em><\/p>\n<p>The desire to keep future breaches from happening is strong immediately after the first breach. Take that time to <a href=\"https:\/\/www.andysowards.com\/blog\/2016\/protect-business-data\/\" target=\"_blank\" rel=\"noopener\">devote to a plan<\/a> that will ensure the safety of your small business. Ask your professional team for advice and consider some of the following options:<\/p>\n<ul>\n<li>Change passwords every 90 days<\/li>\n<li>Routine anti-virus scans every 60-90 days<\/li>\n<li>Establishing and maintaining email protocol to avoid hacks<\/li>\n<li>Procedures for employees to follow to secure data<\/li>\n<li>Routine security audits<\/li>\n<li>Encrypt everything (all emails, computers, hard drives, USBs, etc)<\/li>\n<\/ul>\n<h3>Talk to your Insurance Company<\/h3>\n<p><a href=\"http:\/\/www.cio.com\/article\/3065655\/cyber-attacks-espionage\/what-is-cyber-insurance-and-why-you-need-it.html\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-full wp-image-26108 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/databreach-5.jpg\" alt=\"databreach 5\" width=\"620\" height=\"413\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 620px; --smush-placeholder-aspect-ratio: 620\/413;\" \/><\/a><br \/>\n<em>What is cyber insurance and why you need it<\/em><\/p>\n<p>Insurance companies often have requirements for coverage that include protecting the business. Take some time to speak with your insurance agent to get advice on what it is they require. Additionally, many insurance companies offer discounts if you take certain protective measures. Your agent should be able to advise you on some suggestions that can help you save money.<\/p>\n<p>Security breaches happen often. While it was once believed that large corporations are vulnerable to attacks, we are learning that small businesses are an equally large target for hackers. Especially when you factor in that small businesses cannot afford the security measures a multi-million-dollar global company will use. Your small business is your everything, making the effort to protect it should become top priority.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is nothing scarier than the moment you realize your security has been breached and data stolen. Not only do you deal with the violation of your small business, you<\/p>\n","protected":false},"author":1,"featured_media":26107,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[109],"tags":[5891,6103,6117,6020,974,6064,6094,4368,6116,988,2307,6011,6118,628,5835,5879,21,115,2896],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 Steps To Contain Data Security Breach In Your Business<\/title>\n<meta name=\"description\" content=\"There is nothing scarier than the moment you realize your security has been breached and data stolen. Not only do you deal with the violation of your\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.andysowards.com\/blog\/2017\/5-steps-contain-data-security-breach-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Steps To Contain Data Security Breach In Your Business\" \/>\n<meta property=\"og:description\" content=\"There is nothing scarier than the moment you realize your security has been breached and data stolen. Not only do you deal with the violation of your\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.andysowards.com\/blog\/2017\/5-steps-contain-data-security-breach-business\/\" \/>\n<meta property=\"og:site_name\" content=\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/andysowardsfan\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-07T19:42:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-02T15:33:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.andysowards.com\/blog\/assets\/databreach-4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"443\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andy Sowards\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@andysowards\" \/>\n<meta name=\"twitter:site\" content=\"@andysowards\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andy Sowards\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2017\/5-steps-contain-data-security-breach-business\/\",\"url\":\"https:\/\/www.andysowards.com\/blog\/2017\/5-steps-contain-data-security-breach-business\/\",\"name\":\"5 Steps To Contain Data Security Breach In Your Business\",\"isPartOf\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2017\/5-steps-contain-data-security-breach-business\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2017\/5-steps-contain-data-security-breach-business\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/databreach-4.jpg\",\"datePublished\":\"2017-02-07T19:42:45+00:00\",\"dateModified\":\"2023-08-02T15:33:45+00:00\",\"author\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\"},\"description\":\"There is nothing scarier than the moment you realize your security has been breached and data stolen. Not only do you deal with the violation of your\",\"breadcrumb\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2017\/5-steps-contain-data-security-breach-business\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.andysowards.com\/blog\/2017\/5-steps-contain-data-security-breach-business\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2017\/5-steps-contain-data-security-breach-business\/#primaryimage\",\"url\":\"https:\/\/www.andysowards.com\/blog\/assets\/databreach-4.jpg\",\"contentUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/databreach-4.jpg\",\"width\":600,\"height\":443},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2017\/5-steps-contain-data-security-breach-business\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.andysowards.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Steps To Contain Data Security Breach In Your Business\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\",\"url\":\"https:\/\/www.andysowards.com\/blog\/\",\"name\":\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\",\"description\":\"Design Inspiration &amp; Business Resources for Creatives\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\",\"name\":\"Andy Sowards\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"caption\":\"Andy Sowards\"},\"description\":\"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards\",\"sameAs\":[\"https:\/\/www.andysowards.com\"],\"url\":\"https:\/\/www.andysowards.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Steps To Contain Data Security Breach In Your Business","description":"There is nothing scarier than the moment you realize your security has been breached and data stolen. Not only do you deal with the violation of your","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.andysowards.com\/blog\/2017\/5-steps-contain-data-security-breach-business\/","og_locale":"en_US","og_type":"article","og_title":"5 Steps To Contain Data Security Breach In Your Business","og_description":"There is nothing scarier than the moment you realize your security has been breached and data stolen. Not only do you deal with the violation of your","og_url":"https:\/\/www.andysowards.com\/blog\/2017\/5-steps-contain-data-security-breach-business\/","og_site_name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","article_publisher":"http:\/\/facebook.com\/andysowardsfan","article_published_time":"2017-02-07T19:42:45+00:00","article_modified_time":"2023-08-02T15:33:45+00:00","og_image":[{"width":600,"height":443,"url":"https:\/\/www.andysowards.com\/blog\/assets\/databreach-4.jpg","type":"image\/jpeg"}],"author":"Andy Sowards","twitter_card":"summary_large_image","twitter_creator":"@andysowards","twitter_site":"@andysowards","twitter_misc":{"Written by":"Andy Sowards","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.andysowards.com\/blog\/2017\/5-steps-contain-data-security-breach-business\/","url":"https:\/\/www.andysowards.com\/blog\/2017\/5-steps-contain-data-security-breach-business\/","name":"5 Steps To Contain Data Security Breach In Your Business","isPartOf":{"@id":"https:\/\/www.andysowards.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.andysowards.com\/blog\/2017\/5-steps-contain-data-security-breach-business\/#primaryimage"},"image":{"@id":"https:\/\/www.andysowards.com\/blog\/2017\/5-steps-contain-data-security-breach-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.andysowards.com\/blog\/assets\/databreach-4.jpg","datePublished":"2017-02-07T19:42:45+00:00","dateModified":"2023-08-02T15:33:45+00:00","author":{"@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415"},"description":"There is nothing scarier than the moment you realize your security has been breached and data stolen. Not only do you deal with the violation of your","breadcrumb":{"@id":"https:\/\/www.andysowards.com\/blog\/2017\/5-steps-contain-data-security-breach-business\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.andysowards.com\/blog\/2017\/5-steps-contain-data-security-breach-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/2017\/5-steps-contain-data-security-breach-business\/#primaryimage","url":"https:\/\/www.andysowards.com\/blog\/assets\/databreach-4.jpg","contentUrl":"https:\/\/www.andysowards.com\/blog\/assets\/databreach-4.jpg","width":600,"height":443},{"@type":"BreadcrumbList","@id":"https:\/\/www.andysowards.com\/blog\/2017\/5-steps-contain-data-security-breach-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.andysowards.com\/blog\/"},{"@type":"ListItem","position":2,"name":"5 Steps To Contain Data Security Breach In Your Business"}]},{"@type":"WebSite","@id":"https:\/\/www.andysowards.com\/blog\/#website","url":"https:\/\/www.andysowards.com\/blog\/","name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","description":"Design Inspiration &amp; Business Resources for Creatives","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415","name":"Andy Sowards","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","caption":"Andy Sowards"},"description":"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards","sameAs":["https:\/\/www.andysowards.com"],"url":"https:\/\/www.andysowards.com\/blog\/author\/admin\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/26101"}],"collection":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/comments?post=26101"}],"version-history":[{"count":6,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/26101\/revisions"}],"predecessor-version":[{"id":46780,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/26101\/revisions\/46780"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media\/26107"}],"wp:attachment":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media?parent=26101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/categories?post=26101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/tags?post=26101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}