Skip to content

What do I do in the first hour after a data breach?

The first hour is containment and fact-finding. Do not call the AP yet, first know what happened.

Try this first

  1. 1Log everything from minute zero. Time, reporter, signal, first action. You will need this for the AP notification and possibly insurance.
  2. 2Containment: isolate the compromised account or system. Reset passwords, revoke session tokens, take the device off the network.
  3. 3Categorise the breach. Misdirected email, lost laptop, ransomware, account takeover, accidental disclosure. The category drives next steps.
  4. 4List the personal data potentially affected. Which fields, how many records, which subjects. First estimate is fine; refine later.
  5. 5Call your DPO or, if none, your IT partner. Not the AP yet; that comes at step six.

When to bring us in

Active ransomware or thousands of records affected? Stop DIY. Call us or another CSIRT partner before you click anything else.

See also

None of the above fits?

Describe your situation below. We pass your input plus the steps you already saw to our AI and return tailored next-step advice. If it's too risky to DIY, we'll say so.

Who are you?

For the AI question we need your email and company, so we can follow up if the AI gets stuck, and to prevent abuse.

Limited to 2 questions per hour and 5 per day, kept lean so the AI stays useful. For more, contacting us directly works better for you and us.

Or skip the DIY entirely

Our Managed IT clients do not look these things up. One point of contact, a fixed monthly price, resolved within working hours.