This website uses cookies. View our cookie policy
Close
United Kingdom
Select regional store:

Data breach reporting: preventive measures and taking action

When reporting to the ICO on a personal data breach, you will need to describe any measures you had in place to prevent a breach, the actions you have taken (or will take) as a result of the breach, and actions you have taken to fix the problem and mitigate any adverse effects.

Aligning your information security efforts with best practice will help you reduce the risk of the majority of data breaches, and also help you mitigate any adverse effects if you do experience one.

Effective information security combines three basic tenets: people, processes and technology. This means that you need a set of technical controls, supported by robust policies and procedures, managed by appropriately trained staff, and driven by top leadership.


Discover our range of solutions

The following solutions will help you get information security sorted.

Baseline of cyber security: Cyber Essentials


Cyber Essentials solutions

Cyber Essentials helps you to guard against the most common cyber threats and demonstrate your commitment to cyber security. It will help you to self-assess your network security against five technical controls that have been recognised to prevent 80% of cyber attacks.

For a higher level of information security, consider ISO 27001


Cyber security best practice: ISO 27001 and penetration testing


ISO 27001 implementation bundles

ISO 27001 is the world’s leading information security standard, trusted by thousands of organisations, and supports the implementation of an information security management system (ISMS). Combining bestselling tools, software, guides and qualification-based training with up to 40 hours of online consultancy, our implementation bundles have been expertly created to meet the unique needs of your organisation. These bundles will reduce the time and effort required to implement an ISMS aligned with ISO 27001.


Certificated ISO 27001 training

Our unique ISO 27001 training programme provides a comprehensive introduction to ISO 27001 and its requirements, and delivers practical guidance to implementing and auditing an ISMS (information security management system).


ISO 27001 Documentation toolkit

This toolkit includes all the essential policies and procedures you would ever need to comply with the leading information security standard, ISO 27001, and helps you to implement a system that will enable you to reduce your data breach risks.


Penetration testing

By implementing a regular penetration testing regime, you can continually measure and improve the security performance of your systems and networks, ensuring that your assets and information are appropriately protected at all times.


Managing Cyber Security Risk Training Course

This course helps build on basic foundation-level knowledge of information security management practices to equip practitioners with the expertise to manage cyber security risk and meet compliance objectives in organisations of any size.


Further reading and learning

Once more unto the Breach – Managing information security in an uncertain world, second edition

Learn how to build an appropriate information security policy, achieve better information security results and address security issues with the essential advice in this book.

Find out more

ISO 27001 Expertise book bundle

Learn all about the world’s leading information security standard and develop your understanding of the Standard with 4 different best-selling books.

Find out more


Are you on track with your #BreachReady project?

To help you on your journey, we’re offering a discount on all our data breach solutions for a limited period. Don't fall victim - get #BreachReady today. (Terms and conditions apply.)

 
 

Speak to an expert

Do you know the steps you need to take once you’ve suffered a data breach? Speak to an expert today for more information and discover what to when disaster strikes.