Data breach reporting: preventive measures and taking action
When reporting to the ICO on a personal data breach, you will need to describe any measures you had in place to prevent a breach, the actions you have taken (or will take) as a result of the breach, and actions you have taken to fix the problem and mitigate any adverse effects.
Aligning your information security efforts with best practice will help you reduce the risk of the majority of data breaches, and also help you mitigate any adverse effects if you do experience one.
Effective information security combines three basic tenets: people, processes and technology. This means that you need a set of technical controls, supported by robust policies and procedures, managed by appropriately trained staff, and driven by top leadership.
Save up to 20% with our Breach Essentials Bundles
Improve your cyber security posture and minimise your data breach risk with our range of tailored bundles designed to help you at every stage of the data breach readiness cycle – from threat detection and prevention to protection, response and recovery solutions.
Find out more
Discover our range of solutions
The following solutions will help you get information security sorted.
Baseline of cyber security: Cyber Essentials
Cyber Essentials helps you to guard against the most common cyber threats and demonstrate your commitment to cyber security. It will help you to self-assess your network security against five technical controls that have been recognised to prevent 80% of cyber attacks.
For a higher level of information security, consider ISO 27001
Find out more