ARTICLE
3 November 2017

Top 10 Best Practices for Handling A Data Breach

F
Fenwick

Contributor

Fenwick logo
Fenwick provides comprehensive legal services to leading technology and life sciences companies — at every stage of their lifecycle — and the investors that partner with them. For more than four decades, Fenwick has helped some of the world's most recognized companies become and remain market leaders. Visit fenwick.com to learn more.
Data breaches are a reality that all businesses need to take seriously. Knowing your vulnerabilities is only part of the solution.
United States Privacy

Data breaches are a reality that all businesses need to take seriously. Knowing your vulnerabilities is only part of the solution. You and your key stakeholders should be prepared with an incident response plan that defines roles, responsibilities and protocol so you can manage your risk and protect your data. The first 48 hours are critical as how you initially react and respond to a data breach could have longstanding impact.

Did you know?

  • 62% of breaches involve hacking
  • 81% of hacking-related breaches involved either stolen and/or weak passwords
  • 51% of breaches involve malware
  • 43% of breaches were social attacks*

Add this tool to your toolbox

We have prepared a Top 10 Best Practices for Handling a Data Breach checklist that should be a starting point for you to create your own internal incidence response plan.

*Statistics from 2017 Verizon Data Breach Report

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More