Damage Control: What NOT to Do After a Cyber Incident
August 12, 2025

When a cyberattack hits, it’s easy to panic. But what you do in the hours and days after discovering a breach can determine how much damage your business suffers or how quickly you recover. Unfortunately, many businesses make critical missteps after an incident that only makes things worse.
In Part 1, we shared the top cybersecurity mistakes businesses make before a cyber breach—missteps that leave the door open to attackers. But if it’s already too late and the breach has happened, here’s what you need to know to stay away from.
Here are the top post-incident mistakes to avoid, and how to act swiftly, smartly, and responsibly to protect your business.

Disclaimer: Please note that the information provided herein offers guidelines only. It is not exhaustive and does not constitute legal, insurance, or cybersecurity advice. For more guidance, please consult a lawyer, a licensed insurance representative, and/or a cybersecurity specialist.
1. Delaying Your Response
Every minute counts after a breach. Waiting too long to act gives attackers more time to steal data, spread across your systems, or cause more damage. Delays can also lead to longer downtime, hurt your reputation, and even break reporting rules.
Have a clear, documented incident response plan and activate it immediately. Know who’s responsible for what, isolate affected systems, and start investigating as soon as possible. The faster you act, the more you can limit the impact.
RELATED: Are You Prepared for a Data Breach? The Ultimate Incident Response Plan Checklist
2. Hiding the Breach Entirely
Some businesses hesitate to report a breach out of fear: fear of reputational damage, client backlash, or lawsuits. But trying to keep a cyber incident quiet almost always backfires. If clients, vendors, or regulators find out before you disclose it (which is common), the fallout can be far worse than if you had been upfront from the start.
Notify all relevant stakeholders promptly—affected clients, any vendors or partners you work with, and regulators. Clear, honest communication builds trust, reduces panic, and helps prevent misinformation. It also shows you’re taking accountability.
Remember, under Canadian privacy laws, certain breaches must be reported to the Office of the Privacy Commissioner of Canada if there’s a real risk of significant harm. Failing to notify affected individuals isn’t just risky, it may violate federal, provincial, or international laws like PIPEDA, PHIPA, or the GDPR.
RELATED: All About PIPEDA: How do privacy laws affect my business?
3. Withholding Key Details
Sharing only part of the story, or downplaying the breach to protect your brand, can backfire. Incomplete or vague disclosures may violate compliance requirements, frustrate clients, invite legal action, and create confusion or mistrust.
Clearly share what happened, what systems or data were affected, and what steps you’re taking to fix it.
4. Skipping a Proper Investigation
It’s a good idea to bring in data forensics experts to fully investigate. Just because things look back to normal doesn’t mean the breach is over. Hackers often find sneaky ways to get back in without you knowing.
Cybersecurity experts and breach response consultants have the tools and experience to dig deeper, uncovering the root cause, assessing the full damage, and identifying any lingering threats. A professional investigation ensures the breach is truly contained and helps you prevent it from happening again.
5. Not Preserving Evidence
In the rush to fix things, some may think it’s a good idea to just wipe systems, delete logs, or reinstall software, accidentally destroying key forensic evidence. Remember, documentation is key and without this data, it becomes much harder to fully understand what happened or to hold attackers accountable.
Instead, secure the scene. Isolate affected systems if needed, but preserve everything (like logs, files, emails, access records) so cybersecurity experts can properly investigate and support any future legal or insurance claims.
RELATED: Document Like a Pro: Tips to Protect Your Career from Allegations
6. Overlooking the Human Side
Cyberattacks don’t just impact systems, they can impact people. After a breach, employees may feel anxious, overwhelmed, or even responsible. Without strong leadership and communication, stress, burnout, and internal conflict can take hold, slowing recovery and harming team morale.
Acknowledge the stress your team is under. Communicate clearly, focus on solutions, and offer support. A supported team recovers faster and is better prepared for the future.
7. Blaming or Shaming Employees
Breaches often happen because of simple human errors like clicking a phishing link or making a set-up mistake. But calling out or blaming individual employees can lead to fear, silence, and even more mistakes in the future. It discourages reporting and undermines trust within your team.
Focus on learning, not blame. If the breach was caused by a mistake, help the employee understand what went wrong and how to avoid it next time. Schedule training for your entire team to reinforce cybersecurity best practices and encourage openness and improvement.
RELATED: Security Awareness Training: What is it, Best Practices, & More
8. Not Considering Cyber Insurance
Many business owners still view Cyber Insurance as optional, or assume they can buy it after something goes wrong. But once a breach has occurred, it’s too late. You can’t purchase a policy to retroactively cover an incident that’s already happened. Without the right coverage, you could be stuck paying out-of-pocket.
Cyber Insurance should be part of your plan to keep the business running after a breach. It can help cover costs and connect you with experts to manage the crisis. But you need to have it before an attack—once a breach happens, it’s too late to get covered.
RELATED: All About Cyber Insurance: What is it, What’s Covered, and Why Do You Need it?
9. Delaying Notifying Your Insurance Provider
Many wait too long to notify their insurance provider after a cyber incident, often hoping to resolve the issue internally. But this delay can jeopardize your coverage. Most Cyber Insurance policies require that you report an incident promptly, even if you’re unsure of the full scope, otherwise your coverage could be denied.
If you’re worried about your premiums price spiking, reporting a possible issue doesn’t technically count as a claim yet. It just keeps your insurer in the loop—and helps you get support faster.
Don’t wait. Early notification ensures you meet policy requirements and gives you access to important resources, like breach coaches, legal support, and forensic investigators that can help you recover faster and with less damage.
At PROLINK, we specialize in Cyber Insurance and Risk Management. Our goal is to help you avoid common and costly mistakes before they happen—and support you every step of the way if they do. We’ll work with you to understand your exposures, compare options, and find the right coverage based on your industry, size, and digital infrastructure. With PROLINK on your side, you’re not just insured, you’re prepared.
To learn more about your exposures and how you can protect yourself, visit our Cyber Security & Privacy Breach Toolkit and connect with PROLINK today for more guidance!
PROLINK’s blog posts are general in nature. They do not take into account your personal objectives or financial situation and are not a substitute for professional advice. The specific terms of your policy will always apply. We bear no responsibility for the accuracy, legality, or timeliness of any external content.