• EG Conley Home
  • Why EG Conley
    • Business Performance Advisors
    • Strategic Performance Plan
    • The Principa Alliance
    • Our Team
  • Our Services
    • Business Performance & Growth
    • Performance Benchmarking
    • Tax Services
    • Audit
    • Business Valuations
    • Succession Planning
    • Peer Reviews
    • Retirement Plan Services
    • Payday Solutions
  • Tax Tools
    • Tax Tips
      • Individual
      • Business
      • Financial
    • Tax Rates
    • Due Dates
    • Financial Tools
    • Retention Guide
    • IRS Forms
  • Events
    • Summits & Webinars
  • News
    • Monthly Newsletter
    • Daily News
  • Contact Us
    • Careers

EG Conley Blog

Making your business more valuable.

  • Blog Home
  • Tax Tips
    • Business
    • Individual
    • Non-Profit
    • Payroll
  • Business Performance
  • QuickBooks
  • Accounting
Home Business Management Responding to the nightmare of a data breach

Responding to the nightmare of a data breach

Posted on April 22, 2019 Written by EG Conley, PC Leave a Comment

It’s every business owner’s nightmare. Should hackers gain access to your customers’ or employees’ sensitive data, the very reputation of your company could be compromised. And lawsuits might soon follow.

No business owner wants to think about such a crisis, yet it’s imperative that you do. Suffering a data breach without an emergency response plan leaves you vulnerable to not only the damage of the attack itself, but also the potential fallout from your own panicked decisions.

5 steps to take

A comprehensive plan generally follows five steps once a data breach occurs:

1. Call your attorney. He or she should be able to advise you on the potential legal ramifications of the incident and what you should do or not do (or say) in response. Involve your attorney in the creation of your response plan, so all this won’t come out of the blue.

2. Engage a digital forensics investigator. Contact us for help identifying a forensic investigator that you can turn to in the event of a data breach. The preliminary goal will be to answer two fundamental questions: How were the systems breached? What data did the hackers access? Once these questions have been answered, experts can evaluate the extent of the damage.

3. Fortify your IT systems. While investigative and response procedures are underway, you need to proactively prevent another breach and strengthen controls. Doing so will obviously involve changing passwords, but you may also need to add firewalls, create deeper layers of user authentication or restrict some employees from certain systems.

4. Communicate strategically. No matter the size of the company, the communications goal following a data breach is essentially the same: Provide accurate information about the incident in a reasonably timely manner that preserves the trust of customers, employees, investors, creditors and other stakeholders.

Note that “in a reasonably timely manner” doesn’t mean “immediately.” Often, it’s best to acknowledge an incident occurred but hold off on a detailed statement until you know precisely what happened and can reassure those affected that you’re taking specific measures to control the damage.

5. Activate or adjust credit and IT monitoring services. You may want to initiate an early warning system against future breaches by setting up a credit monitoring service and engaging an IT consultant to periodically check your systems for unauthorized or suspicious activity. Of course, you don’t have to wait for a breach to do these things, but you could increase their intensity or frequency following an incident.

Inevitable risk

Data breaches are an inevitable risk of running a business in today’s networked, technology-driven world. Should this nightmare become a reality, a well-conceived emergency response plan can preserve your company’s goodwill and minimize the negative impact on profitability. We can help you budget for such a plan and establish internal controls to prevent and detect fraud related to (and not related to) data breaches.

© 2019

Filed Under: Business Management, Economics

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Facebook
  • LinkedIn
  • Tumblr

Search the Blog

Subscribe

Get the Adding Value email newsletter

We never share your email address. Opt out at any time.

Tags

ACA Accounts Autos Benefits Capital Gains Cash Flow Charity Credits Customers Deductions Depreciation Divorce Education Employees Estimated Tax Forms Goals Health Insurance HRAs Income Internal Controls IRAs IRS KPIs Life Insurance LLCs Losses Overtime Partnerships Passive Payroll Planning Profit R&D Regulations Rentals Sales & Exchanges S Corps Section 179 SE Tax State Travel Trucks Withholding

Copyright © 2025 · Focus Pro Theme on Genesis Framework · WordPress · Log in