• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to secondary navigation
  • Skip to footer

Before Header

Bryghtpath

Business Continuity and Crisis Management Consultants

  • About
        • About Bryghtpath

        • Our Core Values

        • Meet our Team

        • About Bryghtpath
          • Case Studies & Results
          • Certifications and Awards
          • Contact Bryghtpath
          • Contract Vehicles
          • Media & Professional Appearances
          • Our Clients
          • Our Proven Process
          • Security & Compliance
          • Strategic Partners
          • Work with Us
  • Capabilities
        • Our Capabilities
        • We help your organization strategically navigate uncertainty and disruption.

        • Case Studies & Results

        • Business Continuity as a Service

        • Business Continuity
          • Business Continuity - Overview
          • Business Continuity as a Service (BCaaS)
          • Business Continuity Software
          • Coaching
          • IT Disaster Recovery
          • Resiliency Diagnosis®️
        • Crisis Management
          • Crisis Management - Overview
          • Crisis Communications
          • Crisis Exercises
          • Cyber Crisis Exercises
          • Cyber Incident Response Planning
          • Crisis Playbook®️
          • Global Security Operations Center (GSOC)
          • Resiliency Diagnosis®️
        • Other Capabilities
          • Coaching
          • Intelligence & Global Security Consulting
          • Speaking
          • Training
        • Case Studies & Results
        • Industries
  • Insights
  • Products
        • Our Products

          College Classroom - Mature Teacher
        • Crisis Playbook™️

        • Exercise in a Box™️

        • Exercise in a Day™️

        • Books
          • From Panic to Poise: Crisis Management in the Modern World
          • The Continuity Code: Mastering Business Resilience
        • Crisis Playbook™️
          • Overview
          • Active Shooter Plan
          • Emergency Response Guide
          • Fatality
          • Food/Product Recall
          • Protest
          • Violent Attack
        • Maturity Models
          • Overview
          • ASIS Workplace Violence and Active Assailant
          • FFEIC Maturity Model – Business Continuity
          • ISO 22301 – Business Continuity
          • ISO 22361 – Crisis Management
          • ISO 27031 - IT Disaster Recovery
          • NIST 800-53 Contingency Planning Maturity Model
        • Templates & More
          • After-Action Process & Templates
          • Awareness Collateral
          • Business Continuity Plan Templates
          • Crisis Management Plan Templates
          • Disaster Recovery Plan Templates
          • Job Descriptions
  •  

Mobile Menu

  • About
    • About Bryghtpath
      • Case Studies & Results
      • Certifications and Awards
      • Contact Bryghtpath
      • Contract Vehicles
      • Media & Professional Appearances
      • Our Clients
      • Our Proven Process
      • Security & Compliance
      • Strategic Partners
      • Work with Us
  • Capabilities
    • Our Capabilities
    • Business Continuity
      • Business Continuity – Overview
      • Business Continuity as a Service (BCaaS)
      • Business Continuity Software
      • Coaching
      • IT Disaster Recovery
      • Resiliency Diagnosis®️
    • Crisis Management
      • Crisis Management – Overview
      • Crisis Communications
      • Crisis Exercises
      • Cyber Crisis Exercises
      • Cyber Incident Response Planning
      • Crisis Playbook®️
      • Global Security Operations Center (GSOC)
      • Resiliency Diagnosis®️
    • Other Capabilities
      • Coaching
      • Intelligence & Global Security Consulting
      • Speaking
      • Training
    • Case Studies & Results
    • Industries
  • Insights
  • Products
    • Books
      • From Panic to Poise: Crisis Management in the Modern World
      • The Continuity Code: Mastering Business Resilience
    • Crisis Playbook™️
      • Overview
      • Active Shooter Plan
      • Emergency Response Guide
      • Fatality
      • Food/Product Recall
      • Protest
      • Violent Attack
    • Maturity Models
      • Overview
      • ASIS Workplace Violence and Active Assailant
      • FFEIC Maturity Model – Business Continuity
      • ISO 22301 – Business Continuity
      • ISO 22361 – Crisis Management
      • ISO 27031 – IT Disaster Recovery
      • NIST 800-53 Contingency Planning Maturity Model
    • Templates & More
      • After-Action Process & Templates
      • Awareness Collateral
      • Business Continuity Plan Templates
      • Crisis Management Plan Templates
      • Disaster Recovery Plan Templates
      • Job Descriptions
  •  

8 Essential strategies for Data Breach Communications

You are here: Home / Crisis Communications / 8 Essential strategies for Data Breach Communications
Data Breach & Cyber Attack Matrix

February 12, 2017 By //  by Bryan Strawser

The year of data breaches: 2014. From Target to Home Depot to the U.S. Postal Office, it seemed like more companies were having data breaches than ever before. It was a mess. Most organizations failed at creating effective data breach communications.

We’ve learned from their mistakes what to do – and what not to do during a data breach.

Malicious code, phishing, scams, and viruses were penetrating the protections in place for many companies. The attack wasn’t on the ground, like most crises – it was in cyberspace. Here is a guide for how to handle a data breach.

  1. Flag concerns early: hopefully your company has some kind of system in place for sharing security concerns to a central place. And, it is even more helpful if there are some thresholds in place to determine the potential severity quickly. An average phishing scam email or credit card theft should trigger a ringing of the crisis bell; however, a series of attacks that are similar in nature and more widespread or confirmed deployment of a malicious code means its time to pay attention and start the response process.
  2. Determine impact and escalate quickly: a data breach could mean many different things. But there are just a handful of key pieces of information that spell major concern from a reputation and legal standpoint:
    1. Financial data: including credit card information, account numbers, and PIN numbers.
    2. Personally identifiable information: social security numbers linked to names, addresses or emails.
    3. Health information: health records and individual patient data.

If any of these are included in the data that has been compromised, step 3 should be taken immediately.

  1. Notify stakeholders: If personally identifiable information or health records have been compromised, it is important to immediately notify those whose data has been compromised. In fact, in most states, it is the law. For more information on the laws specific to your state, read more here. Only three states (Alabama, New Mexico, and South Dakota) do not currently have a law requiring consumer notification of security breaches involving personal information. In addition, the Securities and Exchange Commission requires material cyber risks and intrusions be disclosed to investors. It is important to share the news yourself – before others tell your story for you. Get to your customers or patients before the media and you will maintain some trust.
  2. Notify the proper authorities: Relevant government agencies may need to be notified of the incident – such as the Federal Communications Commission, Federal Trade Commission, and in the case of cyberterrorism or criminal activity– the Federal Bureau of Investigation. They will aid in the investigation and help ensure proper protocols are followed in addition to your own legal team. Be aware, once authorities know, the media will know too, so ensure that your stakeholders hear from you before taking this step.
  3. Take responsibility. It may an egregious hacker and there may have been little to nothing that your company could have done to prevent the breach, but in the eyes of your customers, it was your responsibility to protect their data and this type of incident. Do not deflect blame. Accept the responsibility and instill a sense of ownership in fixing or repairing the situation in a swift, secure manner.
  4. Prioritize the investigation. The business will need to go on as usual, but once the headlines begin to slow down, it is easy to pull resources away from gathering the results of information for the investigation quickly and accurately. Maintaining a sense of urgency is essential – because the news cycle can and will return again if the matter isn’t resolved soon. And, your customers and patients are left hanging and concerned about what has happened to their information.
  5. Maintain a line of data breach communications with stakeholders. It is easy to forget to communicate externally about what is happening when an internal investigation is underway. But forgetting your external stakeholders will create a major backlash. External stakeholders to keep informed are media, customers or patients, elected officials, government agencies or entities, and vendors or close business partners. The most important of these is the media and customers or patients. To keep these groups informed, create a “source of truth” for them to find the latest information. Share updates through direct contact (email or phone call) and direct them to the website to find the most up to date information.
    • Media: Continue to tell your story. Get ahead of rumors or negative stories by maintaining strong relationships with influential media. Find the opportunity to start telling some of the positive stories – maybe your company can start an industry coalition to prevent the same issue from happening to others. Or perhaps your business decides to pioneer a new data protection technology. These are good stories – tell them.
    • Customer or patients: Do not overwhelm with too much communication. Sending customers or patients daily updates is too much. You’ll lose readers and annoy the very people that you’re trying to maintain a good relationship with. Instead, aim for less frequent, such as weekly, communications that provide news that they will care about. Include a link to your “source of truth” website page so that those that want more frequent updates can access them. If you are able, provide new benefits to customer or patients to help build up any relationship damage such as free credit, identity fraud monitoring, or significant discounts or freebies.

Find the opportunities to turn the crisis into an opportunity – deeper relationships with media and customers is possible. And there is an opportunity to demonstrate leadership to align your industry and protect customers and patients from future attacks.

  1. Start the next chapter on a positive note. Data breaches aren’t short-term crises generally, but eventually, the situation will resolve and the news cycle will come to an end. It may be in your interest to send a thank you to customers that have stayed loyal. A deeply discounted shopping day or something above and beyond the normal sale. Start off the next chapter of your company’s future with an act of gratitude for those that stayed with you – or a warm welcome to bring in new customers. And don’t forget to do the same for your internal team, who no doubt worked tirelessly for months to problem-solve and keep the business going in the midst of a data breach.

akoBuGxNUejx6KBDuG16Tkf6KJp0fSpiyrZH853rCjdbUHqym7Kgi8MuMJJ3o6INgm4Cl9Sa88GhOd5AlsZ2=s0 8 Essential strategies for Data Breach Communications

Can we help you?

Building an effective post-data breach response process that incorporates crisis management, crisis communications, and other functions within your firm is what we do here at Bryghtpath. Effective data breach communications and planning is at the heart of our efforts.

Bryghtpath has built the crisis management plans and frameworks for many Fortune 500 organizations, non-profits, and public sector agencies. Our firm has more than a century of experience in developing actionable plans to help prepare organizations for the unexpected. Our expertise includes crisis communications and emergency plans/exercises.

Contact us today at +1.612.235.6435 or via our contact form.

Category: Crisis CommunicationsTag: Bryan Strawser, bryghtpath, bryghtpath llc, communications consultant, crisis communications, crisis communications 101, crisis communications consultant, crisis consultant, crisis management, data breach, information security breach, informations security, infosec, pr consultant

About Bryan Strawser

Bryan Strawser is Founder, Principal, and Chief Executive at Bryghtpath LLC, a strategic advisory firm he founded in 2014. He has more than twenty-five years of experience in the areas of, business continuity, disaster recovery, crisis management, enterprise risk, intelligence, and crisis communications.

At Bryghtpath, Bryan leads a team of experts that offer strategic counsel and support to the world’s leading brands, public sector agencies, and nonprofit organizations to strategically navigate uncertainty and disruption.

Learn more about Bryan at this link.

Previous Post: «Executive looking at blueprints Anatomy of a Crisis
Next Post: Recognizing an Active Shooter in the Making Stress - Bearded Man»

Footer

Contact

BRYGHTPATH LLC
+1.612.235.6435

PO Box 131416
Saint Paul, MN 55113
USA


contact@bryghtpath.com

  • Facebook
  • LinkedIn
  • RSS
  • Twitter
  • YouTube

Our Capabilities

  • Business Continuity
    • Business Continuity as a Service (BCaaS)
    • Business Continuity Software
    • Coaching
    • IT Disaster Recovery Consulting Services
    • Resiliency Diagnosis®️
  • Crisis Communications
  • Crisis Management
    • Crisis Exercises
    • Cyber Crisis Exercises
    • Cyber Incident Response Planning
    • Global Security Operations Center (GSOC)
  • Speaking
  • Training

Our Free Courses

Business Continuity 101

Crisis Communications 101

Crisis Management 101

Our Products

After-Action Templates

Books

Business Continuity Plan Templates

Communications & Awareness Collateral Packages

Crisis Plan Templates

Crisis Playbook®

Disaster Recovery Templates

Exercise in a Box®

Exercise in a Day®

Maturity Models

Ready-Made Crisis Plans

Resilience Job Descriptions

Pre-made Processes & Templates

Site Footer

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.


Bryghtpath®, Crisis Management Academy®, Crisis Playbook®, Exercise in a Box®, Exercise in a Day®, Resiliency Diagnosis®, Resilience Operating Model®
and their respective logos are registered trademarks of Bryghtpath LLC in the United States and other countries.


About Bryghtpath LLC | Disclaimer | Privacy | Status Page | Terms of Use

Proudly powered by Mai Theme, the Genesis Framework, and Wordpress.