Data breach reporting: preventive measures and taking action
When reporting to the ICO on a personal data breach, you will need to describe any measures you had in place to prevent a breach, the actions you have taken (or will take) as a result of the breach, and actions you have taken to fix the problem and mitigate any adverse effects.
Aligning your information security efforts with best practice will help you reduce the risk of the majority of data breaches, and also help you mitigate any adverse effects if you do experience one.
Effective information security combines three basic tenets: people, processes and technology. This means that you need a set of technical controls, supported by robust policies and procedures, managed by appropriately trained staff, and driven by top leadership.
Discover our range of solutions
The following solutions will help you get information security sorted.
Baseline of cyber security: Cyber Essentials
Cyber Essentials helps you to guard against the most common cyber threats and demonstrate your commitment to cyber security. It will help you to self-assess your network security against five technical controls that have been recognised to prevent 80% of cyber attacks.
For a higher level of information security, consider ISO 27001
Cyber security best practice: ISO 27001 and penetration testing
ISO 27001 is the world’s leading information security standard, trusted by thousands of organisations, and supports the implementation of an information security management system (ISMS). Combining bestselling tools, software, guides and qualification-based training with up to 40 hours of online consultancy, our implementation bundles have been expertly created to meet the unique needs of your organisation. These bundles will reduce the time and effort required to implement an ISMS aligned with ISO 27001.
Our unique ISO 27001 training programme provides a comprehensive introduction to ISO 27001 and its requirements, and delivers practical guidance to implementing and auditing an ISMS (information security management system).
This toolkit includes all the essential policies and procedures you would ever need to comply with the leading information security standard, ISO 27001, and helps you to implement a system that will enable you to reduce your data breach risks.
By implementing a regular penetration testing regime, you can continually measure and improve the security performance of your systems and networks, ensuring that your assets and information are appropriately protected at all times.
This course helps build on basic foundation-level knowledge of information security management practices to equip practitioners with the expertise to manage cyber security risk and meet compliance objectives in organisations of any size.
Further reading and learning
Learn how to build an appropriate information security policy, achieve better information security results and address security issues with the essential advice in this book.
Find out more
Learn all about the world’s leading information security standard and develop your understanding of the Standard with 4 different best-selling books.
Find out more
Speak to an expert
Do you know the steps you need to take once you’ve suffered a data breach? Speak to an expert today for more information and discover what to when disaster strikes.