Need support for your Computers, Network, Broadband, Web or Email Hosting? Contact Our IT Experts Today

How should you handle a security breach?

During a security breach

Be quick – As soon as you notice something is wrong you need to act quickly.

Limit the ability for the attacker to gain further access to the network – the quickest way to do this is to switch off the computers.

Contact your IT company or breach

After a security breach

Restore organisation to a secure operating state

Work with your IT department or company to ensure that the devices within your company are no longer compromised and that they are safe to go back online. If data has been compromised then this data needs to be restored to your machines.

Learn from the incident

It is important to address the vulnerabilities which are revealed by the security breach. If there are vulnerabilities highlighted from the breach then these are the first things to address. For example, it could show that your internal password policy is weak and so all passwords need to be updated and the policy must be reviewed.

Prevention is better than restoration

It is an old adage but in the case of security, this is very true. Preventing a breach is cheaper, less time-consuming and less stressful than trying to rebuild after a breach has happened. Whether you have experienced a security breach or you want to prevent one these are some key points to consider:

  • Password policy
  • Antivirus and anti-malware software
  • User education
  • Data storage
  • Backup
  • Movement of data
  • Spam protection
  • Staff responsibilities
  • Email backup

If you have experienced a security breach then call us now!

023 8024 9820


    No Twitter Messages

As of 3rd April 2018, ITC is now proud to be part of Net Primates incorporating all of the existing products, services, and customers that have previously been supported by ITC.

For more information please call us on 02381 800 800 or visit