This website uses cookies. View our cookie policy
Close
United Kingdom
Select regional store:

Data breach reporting: preventive measures and taking action

When reporting to the ICO on a personal data breach, you will need to describe any measures you had in place to prevent a breach, the actions you have taken (or will take) as a result of the breach, and actions you have taken to fix the problem and mitigate any adverse effects.

Aligning your information security efforts with best practice will help you reduce the risk of the majority of data breaches, and also help you mitigate any adverse effects if you do experience one.

Effective information security combines three basic tenets: people, processes and technology. This means that you need a set of technical controls, supported by robust policies and procedures, managed by appropriately trained staff, and driven by top leadership.

Save up to 20% with our Breach Essentials Bundles

Improve your cyber security posture and minimise your data breach risk with our range of tailored bundles designed to help you at every stage of the data breach readiness cycle – from threat detection and prevention to protection, response and recovery solutions.

Find out more

Discover our range of solutions

The following solutions will help you get information security sorted.


Baseline of cyber security: Cyber Essentials

Cyber Essentials solutions

Cyber Essentials helps you to guard against the most common cyber threats and demonstrate your commitment to cyber security. It will help you to self-assess your network security against five technical controls that have been recognised to prevent 80% of cyber attacks.

For a higher level of information security, consider ISO 27001

Find out more

Cyber security best practice: ISO 27001 and penetration testing

ISO 27001 implementation bundles

ISO 27001 is the world’s leading information security standard, trusted by thousands of organisations, and supports the implementation of an information security management system (ISMS). Combining bestselling tools, software, guides and qualification-based training with up to 40 hours of online consultancy, our implementation bundles have been expertly created to meet the unique needs of your organisation. These bundles will reduce the time and effort required to implement an ISMS aligned with ISO 27001.

Find out more


Certificated ISO 27001 training

Our unique ISO 27001 training programme provides a comprehensive introduction to ISO 27001 and its requirements, and delivers practical guidance to implementing and auditing an ISMS (information security management system).

Find out more


ISO 27001 Documentation toolkit

This toolkit includes all the essential policies and procedures you would ever need to comply with the leading information security standard, ISO 27001, and helps you to implement a system that will enable you to reduce your data breach risks.

Find out more


Penetration testing

By implementing a regular penetration testing regime, you can continually measure and improve the security performance of your systems and networks, ensuring that your assets and information are appropriately protected at all times.

Find out more


Managing Cyber Security Risk Training Course

This course helps build on basic foundation-level knowledge of information security management practices to equip practitioners with the expertise to manage cyber security risk and meet compliance objectives in organisations of any size.

Find out more

Further reading and learning