Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & Training

Education & Training

Data breaches: Preventing and responding

Proper preparation and response is essential when managing a data breach.

By Jordyn Alger, Managing Editor
Data Breach

Wanniwat Roumruk / iStock / Getty Images Plus via Getty Images

December 12, 2024

It seems as though every day, there’s news of another data breach. As the threats of data breaches continue to evolve, organizations must prepare to respond. Best case scenario, organizations will take precautionary steps to prevent breaches whenever possible.

But why are data breaches such a prevalent threat to the modern enterprise? Claudette McGowan, Chief Executive Officer at Protexxa, explains, “We’ve seen this rush to digitize everything. As this world is changing and going from physical to digital, we've seen ourselves now not just working within the four walls of our organizations, but now working from remote locations on different devices. As a result, we’re seeing the attack surface is growing.”

The transition from physical spaces to digital spaces increases the attack surface, drawing the attention of malicious actors.

“As the attack surface broadens, it increases the opportunity for attack. This is very attractive to cyber criminals who are looking for ways to get into the system,” McGowan states. “As we move to cloud, as we move to interconnected systems, this is a dream for threat actors. They used to have to get through the firewall, but now they can get through the Wi-Fi at an employee’s home, the Wi-Fi at a local coffee shop, or somewhere else.”

Not only are malicious actors motivated by greater accessibility to an organization’s systems, but they are also encouraged by the potential for profitability.

“It's just so lucrative,” McGowan says. “I've talked to threat actors before, and they've said things to me like, ‘Two hacks, and I'm able to support two generations of my family, because this is such a significant win. And what's the ramifications if I get caught? What's the punishment?’”

The ease of performing a data breach coupled with the perceived lack of consequences makes this a tempting avenue for cyber criminals. However, organizations impacted by a data breach cannot claim the same lack of consequences.

The ramifications of data breaches for organizations extend beyond lost or exposed data. McGowan describes potential repercussions, stating, “For many businesses, their main asset is trust. When organizations are breached, that trust is broken. That includes broken trust with the internal stakeholders, the external stakeholders and the general public. So, we certainly see the financial and reputational implications of being breached.”

McGowan asserts that trust isn’t only broken in the event of a data breach. It can also be broken if organizations do not adequately prepare for potential breaches.


Trust is the commodity. Trust is what we all want to secure, and the loss of it could cause irreparable harm to your brand, your image and your profitability.”

Claudette McGowan
Chief Executive Officer
Protexxa

“If you don't put the controls in place to prevent or reduce the likelihood or the impacts of an attack, then trust can be lost,” she warns. “Trust is the commodity. Trust is what we all want to secure, and the loss of it could cause irreparable harm to your brand, your image and your profitability.”

Why are organizations failing at data breach prevention and response?

Many organizations are aware of the danger of data breaches and have taken measures to mitigate them. However, McGowan warns that several businesses’ prevention methods are falling short because visibility is lacking.

“Visibility is essential. If an organization doesn’t understand what they have, what the potential attack surface looks like, then they have a big problem,” McGowan explains. “The real time ability to look for threats, to look for that needle in a haystack, that is where many companies are failing. When I go into the company, one of the first things I ask them is, ‘Tell me about all your assets. Tell me about your inventory.’ And they'll say, ‘Oh, the inventory is a mess.’ That’s how I know that their cybersecurity program is not working, because if they can't see everything and they’re not tracking everything, then how can they be protecting everything?”

How to respond to data breaches

In the event that a data breach occurs, how should organizations respond? McGowan recommends laying a foundational response plan.

“Number one thing is to have a plan and a playbook,” she says. “In the middle of an emergency situation, people need to know what to do. If you’re in a fire, you stop, drop and roll; you look for the exits. For data breaches, you have to have that same plan and playbook.”

Establishing a plan isn’t the only steps an organization should take to prepare for breaches. Security leaders should also help to facilitate company-wide readiness training. Once a plan is recorded and circulated to employees, security leaders must implement opportunities for practicing.

“Businesses need to exercise their preparedness plan,” McGowan states. “Make sure everyone understands their role. Who's the incident commander? Who's calling the shots? Many times, organizations spend a lot of precious moments figuring out who the incident commander is and how to contact them, and that's time you don't have to waste.”

For individuals more involved in the technical side of managing data breaches, McGowan extends an additional piece of advice: “The number one technical action you need to take is containment. Minimize the attack. Disconnect from systems, shut things down. That's really, really important so that the forensic work can begin.”

How to prevent data breaches

While organizations must be prepared to manage data breaches, most would agree the ideal scenario would be to never experience a breach at all. To minimize the chances of being subjected to a data breach, businesses should take preventative measures. McGowan discusses two key steps companies can take to block breach attempts.

“First, take regular audits. Do regular assessments. Check on how your systems are doing, check on how your people are doing,” she advises. “Second, work with a zero trust mindset. We need to verify everything. We need to authenticate everything. We need to monitor everything and make sure that before you offer access to the system, you're making sure that you've done those extra checks. In technical terms, that's things like turning on multifactor authentication.”

Remember the human element

Adopting security-oriented mindsets and deploying authentication checks are excellent tactics to combat data breaches. Nevertheless, McGowan advises companies to not forget the pivotal role of human management.

“Among the breaches you’ve heard about, a majority of them happen through a person,” McGowan points out. “A blind spot among many companies is not considering their people when securing their organization. While you can do a lot with the firewalls and with the endpoints and the network, don't miss the human side of cyber, which is the people.”

KEYWORDS: data breach costs data breach response data breaches data protection

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • person texting on cell phone

    Unpacking data breaches: Insights from security experts

    See More
  • Padlock with computer keys

    Celebrating Data Privacy Day: Experts share data protection insights

    See More
  • Utility lines in sunset

    Software and IT vendors linked to 67% of energy sector breaches

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

See More Products

Events

View AllSubmit An Event
  • December 11, 2025

    Responding to Evolving Threats in Retail Environments

    Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing