USA
Select regional store:

Data breach reporting: preventive measures and taking action

When reporting a personal data breach, regulators will want you to describe any measures you had in place to prevent a breach, the actions you are taking (or will take) as a result of the breach, and actions you have taken to fix the problem and mitigate any adverse effects.

Aligning your information security efforts with best practice will help you reduce the risk of the majority of data breaches, and also help you mitigate any adverse effects if you do experience one.

Effective information security combines three basic tenets: people, processes, and technology. This means that you need a set of technical controls, supported by robust policies and procedures, managed by appropriately trained staff, and driven by top leadership.

Discover our range of solutions

The following solutions will help you get information security sorted.

ISO 27001 implementation bundles

ISO 27001 is the world’s leading information security standard, trusted by thousands of organisations, and supports the implementation of an information security management system (ISMS). Combining bestselling tools, software, guides and qualification-based training with up to 40 hours of online consultancy, our implementation bundles have been expertly created to meet the unique needs of your organisation. These bundles will reduce the time and effort required to implement an ISMS aligned with ISO 27001.

Find out more


Certificated ISO 27001 training

Our unique ISO 27001 training programme provides a comprehensive introduction to ISO 27001 and its requirements, and delivers practical guidance to implementing and auditing an ISMS (information security management system).

Find out more


ISO 27001 Cybersecurity Documentation toolkit

This toolkit includes all the essential policies and procedures you would ever need to comply with the leading information security standard, ISO 27001, and helps you to implement a system that will enable you to reduce your data breach risks.

Find out more


Penetration testing

By implementing a regular penetration testing regime, you can continually measure and improve the security performance of your systems and networks, ensuring that your assets and information are appropriately protected at all times.

Find out more

This website uses cookies. View our cookie policy