Latest news and insights from our industry experts

How To Handle A Cyber Security Incident

Written by Innovate | Oct 20, 2025 10:59:59 AM

The first 30 minutes after a cyber security incident are the most crucial - but how do you plan for that?

The Importance of Speed in Detecting and Responding to Cyber Attacks

Time is (not just) money - and this certainly applies to the response to a cyber attack. The longer it takes to detect and respond to it, the more severe the consequences can be. This includes data loss, operational downtime, revenue loss and potential regulatory fines. Identifying and mitigating threats quickly can significantly reduce the overall impact.

But, a data breach doesn't have to develop into a full-blown crisis if you know what to do within the first 30 minutes.

Operational continuity is paramount, a delayed response can lead to substantial financial losses and eroding customer trust. Therefore, investing in robust detection systems and ensuring a swift response mechanism is in place is essential.

Developing a Clear, Rehearsed Incident Response Plan

An effective incident response plan is not just documented but also rehearsed. Many organisations falter during an actual incident when panic sets in because roles are not clearly defined, causing significant delays, confusion, and stress for all involved.

A well-prepared incident response plan should outline specific roles and responsibilities, detailed steps for containment and recovery, and communication protocols. Regular drills and simulations can help ensure that all team members know their roles and can act swiftly and effectively during a real incident.

It's also important to have a clear action plan for employees to follow immediately if they notice that e.g. their email account has been compromised.

Common M365 Breaches and How to Identify Them

Microsoft 365 environments are often targeted through account compromises or phishing attacks. These breaches can be particularly insidious, as they often go undetected until significant damage has already been done.

To identify such breaches, you should monitor for unusual account activities, such as unexpected login attempts, changes in email forwarding, and unauthorised data access. Implementing multi-factor authentication and regular security awareness training for employees in your organisation (you can also help them with our quick guide) can help in early detection and prevention. The last thing you want after an attacker has broken into your systems is for them to move laterally across your organisation to cause more damage.

Understanding Reporting Requirements

The General Data Protection Regulation (GDPR) mandates that data breaches be reported to the relevant authorities within 72 hours of becoming aware of the incident. This tight timeframe underscores the necessity of having a streamlined reporting process in place.

Failure to comply with GDPR reporting requirements can result in hefty fines and damage to your organisation's reputation. Do you have a dedicated team or individual responsible for breach reporting, with clear guidelines on how to gather and present the necessary information to regulators in place? If not, it's time to act now.

But then there's also the Information Commissioner's Office (ICO) and the need to report to it depending on the type of breach (timescales vary, too).

Furthermore, you also need to ensure you document everything that's happening for compliance and forensics.

Ensuring Cyber Hygiene and Lean Team Readiness

Maintaining good cyber hygiene practices is a fundamental aspect of preventing cyber attacks. This includes regularly updating software, conducting security audits, and educating employees about common threats such as phishing.

Regular training and clear communication channels can help ensure that even small teams are prepared to handle cyber security incidents efficiently.