Back to Blog

How to Recover from a Data Breach: Step by Step

How to Recover from a Data Breach: Step by Step

Discovering that your business has suffered a data breach is one of the most stressful experiences any UK business owner or manager can face. In those first moments of realisation, panic is natural — but panic leads to poor decisions, and poor decisions during a data breach can magnify the damage enormously. What you need is a clear, structured recovery process that addresses every aspect of the breach methodically and thoroughly.

Data breaches are not rare events. The UK Government's Cyber Security Breaches Survey consistently shows that approximately 39% of UK businesses identify at least one cyber attack or breach each year, with the figure rising to 69% for medium businesses and 72% for large businesses. The question is not whether your business will face a breach, but when — and how well-prepared you are to respond.

This step-by-step guide walks you through the entire data breach recovery process, from the initial discovery through containment, investigation, notification, remediation, and the long-term measures that prevent recurrence. Whether you are dealing with a breach right now or preparing for one that has not yet happened, this guide provides the practical framework you need.

39%
of UK businesses identified a cyber breach in the past year
72 hours
GDPR deadline to report qualifying breaches to the ICO
£8,460
Average cost of the most disruptive breach for UK SMEs
287 days
Average time to identify and contain a data breach globally

Step 1: Contain the Breach Immediately

The first priority upon discovering a breach is containment. Every minute that a breach remains active, more data may be compromised, more systems may be affected, and the eventual cost of recovery increases. Containment does not mean fixing everything — it means stopping the bleeding.

If the breach involves compromised user accounts, immediately disable those accounts and force password resets for all potentially affected users. If the breach is through a network vulnerability, isolate the affected systems from the rest of your network. If malware is involved, disconnect affected machines from the network but do not turn them off — forensic investigators may need to examine live system memory.

Do not attempt to "clean up" evidence. In the urgency of the moment, it is tempting to delete suspicious files, wipe affected machines, or restore from backup immediately. Resist this impulse. Evidence preservation is crucial for the investigation that follows, and destroying evidence can actually increase your liability. The ICO expects organisations to be able to demonstrate what happened, and deleting evidence undermines that ability.

Critical First 60 Minutes

The actions you take in the first hour after discovering a breach set the trajectory for the entire recovery. Assemble your incident response team (or contact your IT provider if you do not have one), document what you know so far, isolate affected systems, preserve evidence, and begin a written log of every action taken with timestamps. This log becomes a critical document for the ICO, your insurer, and potentially legal proceedings. Do not rely on memory — write everything down as it happens.

Step 2: Assess the Scope and Impact

Once the immediate breach is contained, you need to understand what happened, what data was affected, and how extensive the damage is. This assessment directly determines your notification obligations, remediation steps, and the resources you need to allocate.

Determine what type of data was compromised. Personal data (names, email addresses, phone numbers) triggers GDPR obligations. Special category data (health information, ethnic origin, political opinions, biometric data) triggers the most stringent requirements. Financial data (bank details, credit card numbers) creates additional regulatory and practical concerns. Each type of data carries different risks for the affected individuals and different obligations for your business.

Establish how many individuals are affected. A breach affecting 10 people requires a different scale of response than one affecting 10,000. Count not just customers but also employees, contractors, suppliers, and any other individuals whose data may have been compromised. When exact numbers are not yet known, work with reasonable estimates and update them as the investigation progresses.

Determine the likely cause. Was this a sophisticated external attack, a phishing email that tricked an employee, a misconfigured cloud service that exposed data publicly, an insider threat, or a lost or stolen device? The cause affects both your remediation approach and the narrative you present to affected individuals and regulators.

Data Type Compromised Risk Level ICO Notification Individual Notification
Names and email addresses Medium Likely required Depends on context
Financial data (bank, card details) High Required Required
Login credentials High Required Required (urgent)
Health or medical data Very High Required Required
National Insurance numbers Very High Required Required
Children's data Very High Required Required (parents/guardians)

Step 3: Notify the ICO (If Required)

Under GDPR, you must notify the Information Commissioner's Office within 72 hours of becoming aware of a personal data breach that is likely to result in a risk to individuals' rights and freedoms. This is not 72 business hours — it is 72 hours from the moment you become aware, including weekends and bank holidays.

Not every breach requires ICO notification. If the breach is unlikely to result in a risk to individuals — for example, if the compromised data was encrypted and the encryption key was not compromised — notification may not be required. However, you must still document the breach internally and your reasoning for not notifying. When in doubt, notify — the ICO is generally more sympathetic to organisations that over-report than those that fail to report when they should have.

The ICO provides an online breach reporting tool at ico.org.uk. You do not need to have all the details when you submit your initial report — the ICO understands that investigations take time. Provide what you know, state what is still under investigation, and commit to providing updates as more information becomes available. The ICO will assess your report and may contact you for further information or to provide guidance on next steps.

Breach discovered (Hour 0)
Contain
Initial assessment (Hours 1-12)
Assess
Scope determination (Hours 12-48)
Investigate
ICO notification (Within 72 hours)
Report
Individual notification (Without undue delay)
Notify

Step 4: Notify Affected Individuals

If the breach is likely to result in a high risk to the rights and freedoms of individuals, you must notify those individuals directly and without undue delay. This is a higher threshold than ICO notification — not every breach that requires ICO reporting also requires individual notification.

Your notification to individuals must be clear, concise, and written in plain language. It should describe the nature of the breach, the types of data involved, the likely consequences, the measures you have taken to address the breach, and what steps individuals can take to protect themselves. Avoid corporate jargon, minimisation language, or anything that sounds like you are downplaying the situation — affected individuals deserve honesty and respect.

Provide practical guidance appropriate to the type of data compromised. If email addresses were exposed, advise recipients to be vigilant about phishing emails. If passwords were compromised, instruct them to change their passwords on your service and any other service where they used the same password. If financial data was exposed, recommend that they contact their bank and consider credit monitoring services.

Good Breach Notification Practices

  • Clear, honest language explaining what happened
  • Specific details about what data was affected
  • Practical steps individuals can take to protect themselves
  • Contact details for questions and support
  • Sent promptly once the breach is confirmed
  • Follow-up communications as investigation progresses
  • Genuine apology and commitment to improvement

Poor Breach Notification Practices

  • Vague language that obscures what happened
  • Buried in marketing emails or small print
  • Delayed for weeks or months after discovery
  • No practical advice for affected individuals
  • Blaming external parties without taking responsibility
  • No way for individuals to ask questions
  • Minimising the severity of the breach

Step 5: Remediate and Recover

With containment and notification addressed, focus shifts to fixing the vulnerabilities that allowed the breach and recovering normal operations. This phase often takes weeks or months, depending on the severity of the breach and the complexity of your IT environment.

Address the root cause first. If the breach was caused by a phishing attack, implement email filtering, conduct staff awareness training, and deploy multi-factor authentication. If a software vulnerability was exploited, apply the relevant patches and audit your entire environment for similar vulnerabilities. If access controls were inadequate, review and strengthen permissions across all systems.

Restore affected systems from clean backups. Verify the integrity of your backups before restoring — if the breach was present for an extended period, even your recent backups may contain compromised data. Work back through your backup history to find the most recent clean copy, and rebuild from there.

Conduct a thorough security review of your entire IT environment, not just the systems directly involved in the breach. Attackers often establish multiple footholds, and addressing only the obvious entry point may leave other backdoors in place. Consider engaging a specialist cyber security firm to conduct a penetration test and vulnerability assessment once you believe the remediation is complete.

Breach containedImmediate
Impact assessed and documentedHours 1-48
ICO notified (if required)Within 72 hours
Individuals notifiedWithout undue delay
Root cause addressedDays to weeks
Full security review completedWeeks to months

Step 6: Learn and Strengthen

Every data breach, however painful, is a learning opportunity. Once the immediate crisis is resolved, conduct a formal post-incident review to understand what happened, why your existing defences failed, and what changes are needed to prevent recurrence.

Document everything. Create a comprehensive incident report covering the timeline of events, the root cause analysis, the actions taken during response, the costs incurred, and the lessons learned. This report serves multiple purposes — it demonstrates to the ICO that you have taken the breach seriously, it provides a basis for insurance claims, and it informs your future security strategy.

Update your incident response plan based on what you learned. If the breach revealed gaps in your detection capabilities, invest in better monitoring. If response times were slower than they should have been, streamline your escalation procedures. If staff awareness was a contributing factor, enhance your training programme. The businesses that suffer most from data breaches are not those that experience them — they are those that experience them and fail to learn from the experience.

Consider pursuing Cyber Essentials or Cyber Essentials Plus certification if you do not already hold it. This NCSC-backed scheme provides a structured framework for baseline cyber security and demonstrates to customers, partners, and regulators that you take security seriously. Many UK businesses pursue certification in the aftermath of a breach as a concrete step towards rebuilding trust and strengthening their defences.

Need Help Responding to a Data Breach?

If your business has experienced a data breach, Cloudswitched provides emergency incident response support for UK businesses. Our security team helps contain the breach, investigate the cause, manage regulatory notifications, and implement the remediation measures needed to restore security and confidence. Contact us immediately for urgent assistance, or get in touch to discuss proactive breach preparedness planning.

GET IN TOUCH
Tags:Data BreachIncident ResponseCybersecurity
CloudSwitched
CloudSwitched

Centrally located in London, Shoreditch, we offer a range of IT services and solutions to small/medium sized companies.