A data breach is an intrusion within your business where sensitive, protected, or confidential data is copied, transmitted, viewed, stolen, or used by an unauthorized individual.

If you think your business has experienced a data breach, we recommend that you act immediately by following our guidelines below, and then proceed to our ReportRecover and Reinforce sections for further assistance. Remember, a data breach can affect your business’s finances, privacy, and reputation.


Some Immediate Action Steps to Take

  • Contact TechStak or Whitehawk for help finding a professional in your area or to speak to a trained technologist.
  • Immediately disconnect infected computers or devices from your business network but don’t turn any machines off until the forensic experts arrive.
  • Change any compromised credentials or passwords right away.
  • Talk to legal counsel for advice about federal and state laws that may impact your response to the breach.
  • Review security breach notification laws by state at
  • After speaking with legal counsel and reviewing security breach notification laws, notify law enforcement, other affected businesses, and affected individuals of the data breach.
  • Share Six Steps to Take Immediately After Learning of a Data Breach with your customers if a data breach has exposed their personal information.
  • Direct consumers to and our identity theft resources if they believe they are at risk or a victim of identity theft due to the data breach.
  • Follow this Data Breach Response Guide developed by the Federal Trade Commission.


Click Here to Report Your Incident to the FBI IC3

Reporting cybercrime incidents to the FBI Internet Crime Complaint Center (IC3) via the link above is very important! The more national reporting data that is collected, the better the chance law enforcement has to catch the criminals and decrease online crime. Although the FBI does not resolve individual complaints directly, they will make your report available to local, state and other law enforcement partners. FAQs about IC3 reporting can be found here. Please read the FBI/IC3 privacy policy here. (If you believe that you’ve received a phishing email, please forward the email directly to


These resources have been gathered, selected and vetted to help simplify the process of recovering after a cybercrime incident has taken place. You may need to contact organizations outside Results will vary depending on your circumstances.


Once you have notified the appropriate organizations and you are on the road to recovery, it is time to reinforce your cybersecurity using these resources and tools.

Implement Preventative Measures

  • Create a data breach response team and response procedures in case of a data breach using this free tool from the FCC.
  • Keep the operating system and security software up to date on all devices in your organization’s network.
  • Routinely back up your business’s data in a secure location.
  • Advise your employees to never click on a link or open an email attachment from someone they don’t know.
  • Establish procedures and open lines of communication to help protect your business and lessen the impact of potential cybercrime.
  • Create strong passwords. Learn how from
  • Always enable a two factor authentication (2FA) on your email, social media and other online accounts– which requires an additional code to log in.
  • Learn how to understand and address cybersecurity risks with the CISA Cyber Essentials Toolkits.

Community Resources

Helpful Videos