Is Your Business Ready for a Data Breach?

Step-by-step data breach response

When a data breach happens, every minute counts. For small and medium enterprises, the difference between a manageable incident and a business-ending crisis often comes down to preparation.

The step-by-step guide below provides the structure you need without the complexity you don’t. Based on regulatory requirements (UK GDPR in this example) and real-world experience, this resource helps you build structure into your operations without overwhelming your team or budget.

1—Assemble Data Breach Team

Form your data breach response team, including:

  • IT security lead
  • Legal/compliance officer
  • Data Protection Officer
  • Communications representative
  • Relevant business unit leaders

Establish this team structure in advance with defined roles, responsibilities, and contact details to ensure efficient response when incident happen.

2—Preliminary Assessment

Conduct an initial assessment to:

  • Identify the nature and timing of the incident
  • Determine potentially compromised data
  • Evaluate immediate risks
  • Document initial findings

See Precedent: Data breach assessment and action plan (sections 2 and 3).

3—Containment and Recovery

Implement immediate and appropriate actions to:

  • limit the breach scope
  • contain affected systems
  • recover data where feasible
  • contact law enforcement when necessary
  • notify relevant insurers

If your organisation has cyber or crime insurance, notify the appropriate insurer. In the case of cyber insurance, the insurer will be able to provide access to data breach management expertise and your policy is likely to cover breach management costs.

See Templates: Data breach assessment and action plan (section 4) and Letter notifying data breach to insurer.

4— Risk Assessment and Documentation

Document the following elements in the Data Breach Register

  • Data types and sensitivity
  • Number of affected individuals
  • Potential consequences for affected individuals
  • Existing technical safeguards
  • Organisational impact
  • All relevant details in the Data Breach Register

See Precedent: Data breach assessment and action plan (section 5).

You must document any personal data breaches, including the facts relating to the personal data breach, its effects and the remedial action taken. See Precedent: Data breach register.

5—Notify the ICO (if required)

Notify the ICO within 72 hours when the breach poses a risk to individuals’ rights and freedoms. Include:

  • Nature and scope of the breach
  • Categories and approximate numbers of affected individuals and records
  • DPO contact information
  • Likely consequences
  • Actions taken or planned

Provide information in phases if complete details are not immediately available.

6—Data Subject Notification (if required)

Inform affected individuals when the breach poses a high risk to their rights and freedoms. Include:

  • Clear description of the breach
  • DPO/contact point details
  • Likely consequences
  • Measures taken or planned
  • Guidance for self-protection

Notification exceptions apply when:

  • Data is adequately protected
  • Subsequent measures mitigate the high risk
  • Notification would require disproportionate effort

7—Third-Party Notifications (if required)

Consider notifying:

  • Business partners and vendors
  • Financial institutions
  • Additional regulatory bodies
  • Law enforcement
  • Insurers
  • Media as appropriate

8—Post-Breach Improvements

Review and implement:

  • Security gap identification
  • Technical and organisational enhancements
  • Policy and procedure updates
  • Staff training
  • Risk register updates
  • Response team debriefing

Maintain documentation of all improvements implemented for good governance.

How Can We Help

Starter Plan

Free policy templates and other resources to get you started today
£7.99
£ 0
  • Data Breach Response Policy
  • Service/feature 2
  • Service/feature 3

Professional Plan

Templates with drafting note plus an hour of workshop to guide you through
£129
£ 99
  • Service/feature 1
  • Service/feature 2
  • Service/feature 3
  • Service/feature 4
  • Service/feature 5

Bespoke Plan

Risk assessment with a set of tailored policies and implementation plan
£ 450
  • Service/feature 1
  • Service/feature 2
  • Service/feature 3
  • Service/feature 4
  • Service/feature 5
  • Service/feature 6
  • Service/feature 7

Why Choose Us

Verified by Industry Experts

Templates and process flows are verified and maintained by certified teams (CISM, CIPP/E, etc.) with significant corporate backgrounds.

Data Regulations Compliance

Our templates are continuously updated to meet GDPR, UK GDPR, and international data protection requirements, ensuring your business stays compliant with evolving regulations.

Resource-Optimised Design

Specifically designed for growing businesses, our templates eliminate complexity while maintaining enterprise-grade security standards, reducing implementation time by 50%.

Industry-Tested Processes and Playbooks

Built from real-world incident response scenarios and battle-tested across multiple sectors, our templates incorporate best practices from over 100 security incidents.

Trusted By

This is a place to showcase the logos of some of your clients

FAQ

A detailed answer to provide information about your business, build trust with potential clients, and help convince the visitor that you are a good fit for them.

A detailed answer to provide information about your business, build trust with potential clients, and help convince the visitor that you are a good fit for them.

A detailed answer to provide information about your business, build trust with potential clients, and help convince the visitor that you are a good fit for them.

A detailed answer to provide information about your business, build trust with potential clients, and help convince the visitor that you are a good fit for them.

A detailed answer to provide information about your business, build trust with potential clients, and help convince the visitor that you are a good fit for them.
A detailed answer to provide information about your business, build trust with potential clients, and help convince the visitor that you are a good fit for them.
A detailed answer to provide information about your business, build trust with potential clients, and help convince the visitor that you are a good fit for them.
A detailed answer to provide information about your business, build trust with potential clients, and help convince the visitor that you are a good fit for them.

A Title to Turn the Visitor Into a Lead

Use this short paragraph to explain how you will deliver this benefit to the visitor if they decide to work with you.

© 2025 All Rights Reserved.

Why Choose Us

benefit 1

A short description of the benefit.

benefit 2

A short description of the benefit.

benefit 3

A short description of the benefit.

benefit 4

A short description of the benefit.