As a Director of Information Technology, I know that it is crucial to be aware of the steps to take in case of a data breach. This blog post will discuss what to do if your business or personal information is hacked, stolen, and out on the Dark Web.
The first step is to secure your systems and fix vulnerabilities that may have caused the breach. Move quickly to secure your operations and prevent additional data loss. The exact steps to take depend on the nature of the breach and the structure of your business. Assemble a team of experts to conduct a comprehensive breach response. Depending on the size and nature of your company, they may include forensics, legal, information security, information technology, operations, human resources, communications, investor relations, and management.
The next step is to identify the source and scope of the breach. Consider hiring independent forensic investigators to help you determine this. They will capture forensic images of affected systems, collect and analyze evidence, and outline remediation steps. Talk to your legal counsel. Then, you may consider hiring outside legal counsel with privacy and data security expertise. They can advise you on federal and state laws that may be implicated by a breach.
Once you have identified the source and scope of the breach, stop additional data loss. Take all affected equipment offline immediately and closely monitor all entry and exit points, especially those involved in the breach. If possible, put clean machines online in place of affected ones. In addition, update the credentials and passwords of authorized users. If a hacker stole credentials, your system would remain vulnerable until you change those credentials, even if you’ve removed the hacker’s tools.
If your personal information has been misused, visit the FTC’s site at IdentityTheft.gov to report the identity theft and get recovery steps. Even if you do not find any suspicious activity on your initial credit reports, the FTC recommends that you check your credit reports periodically so you can spot problems and address them quickly.
In conclusion, it is important to take immediate action in case of a data breach. By following the steps outlined above, you can minimize the damage caused by the breach and prevent future breaches from occurring.

Director of IT, New Resources Consulting
chippensteel@newresources.com
414.289.7960
Chris Hippensteel
Director of IT, New Resources Consulting
chippensteel@newresources.com
414.289.7960

