{"id":28440,"date":"2022-06-29T15:02:50","date_gmt":"2022-06-29T15:02:50","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=28440"},"modified":"2026-03-18T04:29:10","modified_gmt":"2026-03-18T04:29:10","slug":"what-should-a-company-do-after-a-data-breach","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/what-should-a-company-do-after-a-data-breach\/","title":{"rendered":"What Should a Company Do After a Data Breach?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">No company is 100% immune to data leaks. Cyberattackers are constantly improving their methods, and tech companies can only do so much to stay updated. No matter the industry or size of the company, everyone is a potential target online.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/easydmarc.com\/blog\/what-is-a-data-breach\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Data breaches<\/span><\/a><span style=\"font-weight: 400;\"> aren\u2019t inevitable, but preventive measures go a long way. If you run a successful brand, you can&#8217;t overlook <\/span><a href=\"https:\/\/easydmarc.com\/blog\/why-is-data-loss-prevention-dlp-important\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">the importance of data loss prevention plans<\/span><\/a><span style=\"font-weight: 400;\">. If your DLP plans fail, it\u2019s good to have a backup strategy to work on <\/span><b>regaining trust after a data breach<\/b><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dealing with a data leak on a personal level is one thing, but <\/span><b>what should a company do after a data breach<\/b><span style=\"font-weight: 400;\">? In this blog, we discuss the various options. We look at general practices to avoid financial losses and the best course of action to lessen the impact of a data breach. Ready? Let&#8217;s get started:<\/span><\/p>\n<h2><b>General Best Practices<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Let&#8217;s get into an uncomfortable scenario for a moment: You\u2019ve just learned your personal data has been leaked on the internet. It can be a <\/span><span style=\"font-weight: 400;\">data breach<\/span><span style=\"font-weight: 400;\"> at your bank or your details exposed on a social network. You first need to consider that all cyberattacks have a single goal: Financial gain. That&#8217;s why it&#8217;s important to keep track of your accounts and watch out for any expenses you don&#8217;t recognize.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are some of the actions you can take:\u00a0<\/span><\/p>\n<h3><b>Gain Control of Your Financial Accounts<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">One of the first <\/span><b>steps after a data breach<\/b><span style=\"font-weight: 400;\"> is to close the lid on your bank account. If your bank details have been compromised, call your bank and let them know. Be precise with the information you give them regarding dates and potential moments of fraudulent activity.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That way, they may reimburse or reverse any unauthorized transactions.. While it doesn&#8217;t necessarily help, you should also file a police report so law enforcement is aware of the cyberattack.\u00a0<\/span><\/p>\n<h3><b>Change Bank Account and Card Information (If Exposed)<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">If you\u2019re wondering <\/span><b>how to protect yourself after a data breach<\/b><span style=\"font-weight: 400;\">, contacting your bank and freezing your financial products is a good start. Call your bank and suspend all credit or debit cards until you\u2019ve secured your account. The best way to prevent this issue is by using a Unified Payment Interface, which is a tool that allows you to handle your bank details without ongoing input. You can also use online banking options such as virtual debit cards with a preset limit for specific expenses.<\/span><\/p>\n<h3><b>Freeze Your Credit Reports<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">One of the best <\/span><b>steps after a data breach<\/b><span style=\"font-weight: 400;\"> is to freeze your credit reports. Your credit information is usually collected by three separate bureaus: Experian, Equifax, and TransUnion. These companies&#8217; databases are very public and easy to access, making them an open buffet for malicious actors.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can have your identity stolen in a matter of moments, but a security freeze can protect you against a data leak. You only need to contact these institutions, and they&#8217;ll assign a PIN you can use to lock your credit. This blocks anyone from creating accounts to your name or asking for loans.\u00a0<\/span><\/p>\n<h3><b>Change Your Social Security Number (If Exposed)<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Cyber actors can use your social security number to file tax returns in your name or to steal your identity and run a scam. The Federal Trade Commission has set up a website named identitytheft.gov.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">They help you with tips and advice to follow in case your social security number gets leaked online. The list of actions you can take after a leak is long, but so are the numbers of scams you can face. If the leak is too overwhelming on your finances, you may want to change your social security number.\u00a0<\/span><\/p>\n<h3><b>Reset Usernames and\/or Passwords<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Knowing <\/span><b>how to protect yourself after a data breach<\/b><span style=\"font-weight: 400;\"> means resetting all usernames and passwords immediately. It\u2019s simple, but it works. A strong password can keep any potential attacker away. The best passwords are built with structured sentences, cases, and special characters. But never use the same password for multiple accounts. Get a trustworthy password manager if you have difficulties remembering all passwords.<\/span><\/p>\n<h2><b>For Businesses<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Modern companies struggle to find the proper security measures for their data. That&#8217;s why so many fall victim to cyberattacks. The steps an organization takes to <\/span><b>regain trust after a data breach<\/b><span style=\"font-weight: 400;\"> are as crucial as the security measures taken to prevent data leaks. Here\u2019s a list of actions every company should follow after experiencing a data breach, regardless of size.<\/span><\/p>\n<h3><b>Contain the Breach<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">You must first contain the damage when deciding <\/span><b>how to protect yourself after a data breach<\/b><span style=\"font-weight: 400;\">.<\/span><span style=\"font-weight: 400;\"> Disconnect all compromised servers,\u00a0 computers, and devices from the internet and disable any remote access. Check their firewalls, ensure the systems are updated with the latest security patches, and change all passwords.<\/span><\/p>\n<h3><b>Assess the Damages<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">As a leader, it&#8217;s your job to know <\/span><b>what a company should do after a data breach<\/b><span style=\"font-weight: 400;\">. First, check whether you&#8217;re the sole victim of the breach or if you&#8217;re dealing with a widespread attack. <\/span><span style=\"font-weight: 400;\">You also have to determine what caused the breach, so make sure to collect specific bits of information. Most importantly:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<ol>\n<li><span style=\"font-weight: 400;\">Find out how the attack began.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Identify employees with access to the infected systems.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Learn which network connections were active when the breach happened.\u00a0<\/span><\/li>\n<\/ol>\n<h3><b>Fix Vulnerabilities<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">One of the <\/span><b>steps to take after a data breach<\/b><span style=\"font-weight: 400;\"> is to fix the vulnerability that caused the leak in the first place. Work with your IT department and a forensics team to determine how the breach happened. They can find out if any third parties are involved and the extent of the data breach.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After thorough evaluation, implement and test any short- or long-term vulnerability fixes to ensure the weakness has been adequately addressed.<\/span><\/p>\n<h3><b>Secure the Office Space and Other Physical Areas<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Sometimes, data breaches come from within. Many cyberattacks are carried out by people accessing your company&#8217;s facilities posing as a messenger or employee. If you detect a data breach early on, implement lockdown protocols in your facility to prevent anybody on the premises from entering or leaving. It&#8217;s a long shot, but one that can help identify who the attacker is.\u00a0<\/span><\/p>\n<h3><b>Talk to the People Who Found the Breach<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">When you&#8217;re working on <\/span><b>regaining trust after a data breach<\/b><span style=\"font-weight: 400;\">, information is key. You need to know exactly what happened and how. If someone on your team found the leak, make sure they tell the IT team everything they know. Go over the events more than once without leaving out any details. If you\u2019re working with third parties, share any helpful information.\u00a0<\/span><\/p>\n<h3><b>Don&#8217;t Make Rash Decisions to Avoid Destroying the Evidence<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Once you discover you&#8217;re the victim of a data breach, take your time to understand what happened. Don&#8217;t do anything irrational and contact your IT team immediately. It may be tempting to delete all data after an attack, but you could destroy important evidence required to evaluate how the data breach happened in the first place.\u00a0<\/span><\/p>\n<h3><b>Notify Affected Parties and Relevant Agencies<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">As you go down your checklist on <\/span><b>what to do after a data breach<\/b><span style=\"font-weight: 400;\">, it&#8217;s time to let clients, business partners, and security agencies know about the attack. Make sure you follow any legal or regulatory data breach requirements. Large companies opt for press releases, but a small business must directly contact the parties involved.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Be as thorough and detailed as you can. Let them know how they\u2019ve been affected and what assets have been compromised. Security agencies such as the FBI or the IC3 will want to understand the extent of damages and the security you had in place.<\/span><\/p>\n<h3><b>Set up New Security Measures<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">After a data breach, you must think of new <\/span><a href=\"https:\/\/easydmarc.com\/blog\/11-ways-to-prevent-data-loss-and-data-breaches-in-2022\/\"><span style=\"font-weight: 400;\">ways to prevent data loss<\/span><\/a><span style=\"font-weight: 400;\">. The steps you take at this stage are crucial in <\/span><b>regaining trust after a data breach<\/b><span style=\"font-weight: 400;\"> in the public eye. Even the most sophisticated DLP strategies have a crack ready to be exploited by hackers.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After facing a data leak, approach cybersecurity from a new angle. Set up new security measures better suited to your business. Your new DLP plan can include using <\/span><span style=\"font-weight: 400;\">password managers,<\/span><span style=\"font-weight: 400;\"> creating solid backups, training your team on <\/span><a href=\"https:\/\/easydmarc.com\/blog\/10-best-practices-for-business-email-security-for-2022\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">email security best practices<\/span><\/a><span style=\"font-weight: 400;\">, multi-factor authentication, and more.\u00a0<\/span><\/p>\n<h3><b>Update Security Breach Protocols<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">You\u2019re often left wondering <\/span><b>what to do after a data breach <\/b><span style=\"font-weight: 400;\">in terms of security. Since the protocols you had in place didn&#8217;t prevent the breach, it\u2019s time to update them. This includes basic steps and some a bit more complex. Update your operating system and all security patches in any running software.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Make sure your firewalls and antivirus programs are all updated too. Implement user access privileges, intrusion system detection, penetration testing, and vulnerability scanning measures.<\/span><\/p>\n<h3><b>Get Cyber Liability Insurance<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">One good step after a data breach is to get <a href=\"https:\/\/www.businessinsuranceusa.com\/news\/insurance\/a-history-of-cyber-liability-insurance\" target=\"_blank\" rel=\"noopener\">cyber liability insurance<\/a>. This offers coverage options for businesses faced with cybersecurity issues. You can cover your company for loss of income due to downtime. You can also get coverage for costs related to recovering data, repairing any damaged equipment, investigation, litigation, fines, and crisis management expenses.\u00a0<\/span><\/p>\n<h3><b>Test Your Security<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">One of the critical aspects of <\/span><b>regaining trust after a data breach<\/b><span style=\"font-weight: 400;\"> is how quickly your company manages to get back online. Once you\u2019ve implemented any short-term fixes, identify and test long-term solutions.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0Perform regular penetration testing to ensure any new measures are effective and no vulnerabilities remain.<\/span><\/p>\n<h2><b>Final Thoughts<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Learning <\/span><b>how to protect yourself after a data breach<\/b><span style=\"font-weight: 400;\"> can be more expensive than taking preventive measures. A <\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-is-a-data-leak\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">data leak<\/span><\/a><span style=\"font-weight: 400;\"> can drag your brand&#8217;s name through the mud. Very few companies manage to get back on their feet after these events. <\/span><a href=\"https:\/\/easydmarc.com\/blog\/top-10-most-common-types-of-cyber-attacks\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Cyberattacks<\/span><\/a><span style=\"font-weight: 400;\"> have one goal\u2014financial gain. That&#8217;s why keeping your data safe with proper password hygiene, a good antivirus solution, well-trained personnel, and the best DLP plan is important.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dealing with a data breach requires work, and there&#8217;s no guarantee of a comeback after being hit. Your DLP strategy must contain the damage and determine what and how it happened.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Communication between your IT team, clients, partners, and federal agencies should flow quickly and efficiently. Get cyber liability insurance and conduct regular penetration testing to make sure all vulnerabilities are addressed.<br \/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>No company is 100% immune to data leaks. &#8230;<\/p>\n","protected":false},"author":1,"featured_media":33269,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[204,199,307],"tags":[],"class_list":["post-28440","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cybersecurity","category-data-loss-prevention"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What Should a Company Do After a Data Breach? | EasyDMARC<\/title>\n<meta name=\"description\" content=\"What a company should do after a data breach? A blow to your security is hard to deal with, but learn how to handle it effectively here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/what-should-a-company-do-after-a-data-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Should a Company Do After a Data Breach?\" \/>\n<meta property=\"og:description\" content=\"What a company should do after a data breach? A blow to your security is hard to deal with, but learn how to handle it effectively here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/what-should-a-company-do-after-a-data-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-29T15:02:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-18T04:29:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/06\/What-should-a-Company-Do-After-a-Data-Breach_-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1441\" \/>\n\t<meta property=\"og:image:height\" content=\"911\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-should-a-company-do-after-a-data-breach\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-should-a-company-do-after-a-data-breach\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"What Should a Company Do After a Data Breach?\",\"datePublished\":\"2022-06-29T15:02:50+00:00\",\"dateModified\":\"2026-03-18T04:29:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-should-a-company-do-after-a-data-breach\\\/\"},\"wordCount\":1732,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-should-a-company-do-after-a-data-breach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/What-should-a-Company-Do-After-a-Data-Breach_-1.jpg\",\"articleSection\":[\"Blog\",\"Cybersecurity\",\"Data Loss Prevention\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-should-a-company-do-after-a-data-breach\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-should-a-company-do-after-a-data-breach\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-should-a-company-do-after-a-data-breach\\\/\",\"name\":\"What Should a Company Do After a Data Breach? | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-should-a-company-do-after-a-data-breach\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-should-a-company-do-after-a-data-breach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/What-should-a-Company-Do-After-a-Data-Breach_-1.jpg\",\"datePublished\":\"2022-06-29T15:02:50+00:00\",\"dateModified\":\"2026-03-18T04:29:10+00:00\",\"description\":\"What a company should do after a data breach? A blow to your security is hard to deal with, but learn how to handle it effectively here.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-should-a-company-do-after-a-data-breach\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-should-a-company-do-after-a-data-breach\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-should-a-company-do-after-a-data-breach\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/What-should-a-Company-Do-After-a-Data-Breach_-1.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/What-should-a-Company-Do-After-a-Data-Breach_-1.jpg\",\"width\":1441,\"height\":911},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-should-a-company-do-after-a-data-breach\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Data Loss Prevention\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/data-loss-prevention\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"What Should a Company Do After a Data Breach?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What Should a Company Do After a Data Breach? | EasyDMARC","description":"What a company should do after a data breach? A blow to your security is hard to deal with, but learn how to handle it effectively here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/what-should-a-company-do-after-a-data-breach\/","og_locale":"en_US","og_type":"article","og_title":"What Should a Company Do After a Data Breach?","og_description":"What a company should do after a data breach? A blow to your security is hard to deal with, but learn how to handle it effectively here.","og_url":"https:\/\/easydmarc.com\/blog\/what-should-a-company-do-after-a-data-breach\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2022-06-29T15:02:50+00:00","article_modified_time":"2026-03-18T04:29:10+00:00","og_image":[{"width":1441,"height":911,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/06\/What-should-a-Company-Do-After-a-Data-Breach_-1.jpg","type":"image\/jpeg"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/what-should-a-company-do-after-a-data-breach\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/what-should-a-company-do-after-a-data-breach\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"What Should a Company Do After a Data Breach?","datePublished":"2022-06-29T15:02:50+00:00","dateModified":"2026-03-18T04:29:10+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-should-a-company-do-after-a-data-breach\/"},"wordCount":1732,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-should-a-company-do-after-a-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/06\/What-should-a-Company-Do-After-a-Data-Breach_-1.jpg","articleSection":["Blog","Cybersecurity","Data Loss Prevention"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/what-should-a-company-do-after-a-data-breach\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/what-should-a-company-do-after-a-data-breach\/","url":"https:\/\/easydmarc.com\/blog\/what-should-a-company-do-after-a-data-breach\/","name":"What Should a Company Do After a Data Breach? | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-should-a-company-do-after-a-data-breach\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-should-a-company-do-after-a-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/06\/What-should-a-Company-Do-After-a-Data-Breach_-1.jpg","datePublished":"2022-06-29T15:02:50+00:00","dateModified":"2026-03-18T04:29:10+00:00","description":"What a company should do after a data breach? A blow to your security is hard to deal with, but learn how to handle it effectively here.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/what-should-a-company-do-after-a-data-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/what-should-a-company-do-after-a-data-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/what-should-a-company-do-after-a-data-breach\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/06\/What-should-a-Company-Do-After-a-Data-Breach_-1.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/06\/What-should-a-Company-Do-After-a-Data-Breach_-1.jpg","width":1441,"height":911},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/what-should-a-company-do-after-a-data-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Data Loss Prevention","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/data-loss-prevention\/"},{"@type":"ListItem","position":5,"name":"What Should a Company Do After a Data Breach?"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/06\/What-should-a-Company-Do-After-a-Data-Breach_-1.jpg","_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/28440","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=28440"}],"version-history":[{"count":1,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/28440\/revisions"}],"predecessor-version":[{"id":59870,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/28440\/revisions\/59870"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/33269"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=28440"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=28440"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=28440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}