What to Do If Your Business Gets Hacked


Cyber attacks don’t always come with warning. Many businesses only realise something is wrong after systems stop working,

accounts are locked, or suspicious emails are sent from their own domain.

Knowing what to do immediately after a cyber incident can significantly reduce damage and recovery time.

Step 1: Contain the Incident Immediately

The first priority is to stop the attack from spreading.

This may include:

  • Disconnecting affected devices from the network

  • Locking compromised user accounts

  • Preventing further access to systems or cloud services

Quick containment can limit data loss and operational disruption.


Step 2: Do Not Delete Evidence

It may be tempting to reset systems or delete files, but this can make the situation worse.

Preserving logs, emails, and system activity helps:

  • Understand how the attack occurred

  • Identify what was accessed

  • Support recovery and remediation efforts

Accurate information is critical at this stage.


Step 3: Identify What Was Affected

Not all cyber incidents have the same impact. It’s important to determine:

  • Which systems or accounts were compromised

  • Whether data was accessed or stolen

  • If the attack is still ongoing

This helps guide the correct response and next steps.


Step 4: Secure Accounts and Systems

Once the threat is contained, affected systems and accounts must be secured.

This typically includes:

  • Resetting passwords

  • Enabling or enforcing multi-factor authentication

  • Removing unauthorised access

  • Applying security updates and configuration fixes

These actions reduce the risk of re-entry by attackers.


Step 5: Assess Business and Legal Impact

Depending on the incident, businesses may need to consider:

  • Customer or supplier notification

  • Regulatory or compliance obligations

  • Cyber insurance requirements

Understanding these obligations early helps avoid further issues.

Step 6: Strengthen Security to Prevent Recurrence

Most cyber incidents exploit known weaknesses. After recovery, it’s important to address the root cause.

This may involve:

  • Improving email and cloud security

  • Training staff to recognise threats

  • Reviewing access controls and permissions

  • Conducting a security assessment

Prevention is always more effective than repeated recovery.

Next
Next

Why Small Businesses Are Prime Targets for Cyber Attacks