{"id":193,"date":"2020-02-18T06:54:09","date_gmt":"2020-02-18T06:54:09","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=193"},"modified":"2020-02-18T06:54:09","modified_gmt":"2020-02-18T06:54:09","slug":"mistakes-to-avoid-when-disclosing-your-data-breach","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/mistakes-to-avoid-when-disclosing-your-data-breach\/","title":{"rendered":"Mistakes to Avoid When Disclosing Your Data Breach"},"content":{"rendered":"\n<p>It&#8217;s a nightmare scenario, one that&#8217;s more and more common every year as data becomes more valuable \u2014 despite your best defenses, some of the confidential data your company holds on to was accessed by hackers or cyber criminals. While the breach is in the past, there&#8217;s a lot your company can still do to make the best of the situation \u2014 as well as a number of pitfalls that even major businesses fall into. Here are five mistakes that you need to avoid when disclosing a data breach. <a href=\"https:\/\/www.drchaos.com\/\/post\/5-mistakes-to-avoid-when-disclosing-your-data-breach?utm_source=feedburner&amp;utm_medium=email&amp;utm_campaign=Feed%3A+drchaos+%28Dr+Chaos%29\">Read More<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Not Having a Plan<\/li><li>Not Moving Fast Enough<\/li><li>Trying to Cover Up the Breach<\/li><li>Not Contacting the Right Authorities<\/li><li>Providing Too Little Information \u2014 or Too Much<\/li><\/ul>\n\n\n\n<p>iTM covers all aspects of cybersecurity from Home cyber security managed solutions to automated, manage threat intelligence, forensic investigations and cyber security training. Our objective is to support organisations and consumers at every step of their cyber maturity journey.<a href=\"https:\/\/www.itminister.co.uk\/contact.html\"> Contact Us<\/a> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s a nightmare scenario, one that&#8217;s more and more common every year as data becomes more valuable \u2014 despite your best defenses, some of the confidential data your company holds on to was accessed by hackers or cyber criminals. While the breach is in the past, there&#8217;s a lot your company can still do to &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/mistakes-to-avoid-when-disclosing-your-data-breach\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Mistakes to Avoid When Disclosing Your Data Breach&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[17,18,7],"tags":[],"class_list":["post-193","post","type-post","status-publish","format-standard","hentry","category-cyber-risk","category-cyber-security-best-practice","category-privacy"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=193"}],"version-history":[{"count":1,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/193\/revisions"}],"predecessor-version":[{"id":194,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/193\/revisions\/194"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}