Copyright

Data Breach Response Plans

Data Breach Response Plans
Coming up next: Data Breach Notification Laws

You're on a roll. Keep up the good work!

Take Quiz Watch Next Lesson
 Replay
Your next lesson will play in 10 seconds
  • 0:00 Data Breaches
  • 0:35 Before the Breach
  • 1:31 After the Breach
  • 3:05 Lesson Summary
Save Save Save

Want to watch this again later?

Log in or sign up to add this lesson to a Custom Course.

Log in or Sign up

Timeline
Autoplay
Autoplay
Speed
Lesson Transcript
Instructor: Kaitlin Oglesby
While database administrators and CIOs may do well to hope that they never have to contend with a data breach, they should nonetheless make sure that a response plan is in place. In this lesson, we'll look at how you can prepare yourself against a breach, and what you can do after one occurs.

Data Breaches

Unfortunately, data breaches, or a leak of secure information, are a continuing concern for companies of all sizes. As more and more of our lives move into the digital sphere, this is only going to continue to become a more acute threat. However, there are steps that can be taken before and after a data breach to avoid them, as well as limit the damage once it is done. In this lesson, we'll learn how to prepare a response plan, or a plan of action, against data breaches.

Before the Breach

Not surprisingly, the old adage of an ounce of preparation being worth a pound of cure is very true when it comes to protecting data. The more steps that you can take to keep your information safe, the less likely you will be to actually have to draw on the information that you learn elsewhere in this lesson.

First of all, make sure that you have a plan in place to respond. Identify a team of people who will be responsible, as well as making sure that they know what they should do in the event of a data breach. Make sure that you have different plans for different types of data breaches. Pivotal to this is emphasizing the importance of not losing devices that link back to data.

Finally, check on your data. Make sure that sensitive data is well protected, that all data is backed up, and that there is not an easy way for outsiders or disgruntled insiders to access the data.

After the Breach

Even if a data breach occurs, there is still a great deal that can be done to mitigate the situation. First things first, make sure that there was an actual data breach. While this may sound rather elementary, the treatment for a non-existent data breach could end up having a negative impact on your company. Additionally, through this investigation, you will also be able to learn a great deal about the data breach itself. Was it an outside job or the work of a disgruntled employee? These facts can help make sure that the response is as appropriate as possible.

To unlock this lesson you must be a Study.com Member.
Create your account

Register to view this lesson

Are you a student or a teacher?

Unlock Your Education

See for yourself why 30 million people use Study.com

Become a Study.com member and start learning now.
Become a Member  Back
What teachers are saying about Study.com
Try it risk-free for 30 days

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Create an account to start this course today
Try it risk-free for 30 days!
Create an account
Support