Prevention Although attention to security can reduce the risk of data breach, it cannot bring it to zero. Security is not the only priority of organizations, and an attempt to achieve perfect security would make the technology unusable. Many companies hire a
chief information security officer (CISO) to oversee the company's information security strategy. To obtain information about potential threats, security professionals will network with each other and share information with other organizations facing similar threats. Defense measures can include an updated incident response strategy, contracts with
digital forensics firms that could investigate a breach,
cyber insurance, and monitoring the
dark web for stolen credentials of employees. In 2024, the United States' National Institute of Standards and Technology (NIST) issued a special publication, "Data Confidentiality: Identifying and Protecting Assets Against Data Breaches". The
NIST Cybersecurity Framework also contains information about data protection. Other organizations have released different standards for data protection. The architecture of a company's systems plays a key role in deterring attackers. Daswani and Elbayadi recommend having only one means of
authentication, avoiding redundant systems, and making the most secure setting default.
Defense in depth and
distributed privilege—requiring multiple authentications to perform an operation—can make systems more difficult to compromise. Giving employees and software the least amount of access necessary to fulfill their functions (
principle of least privilege) limits the likelihood and damage of breaches. Several data breaches were enabled by reliance on
security by obscurity; the victims had put access credentials in publicly accessible files. Nevertheless, prioritizing ease of use is also important because otherwise users might circumvent the security systems. Rigorous
software testing, including
penetration testing, can reduce software vulnerabilities, and must be performed prior to each release even if the company is using a
continuous integration/continuous deployment model where new versions are constantly being rolled out. The principle of
least persistence—avoiding the collection of data that is not necessary and destruction of data that is no longer necessary—can mitigate the harm from breaches. The challenge is that destroying data can be more complex with modern database systems.
Response Many data breaches are never detected. Of those that are, most breaches are detected by third parties; others are detected by employees or automated systems. Responding to breaches is often the responsibility of a dedicated
computer security incident response team, often including technical experts,
public relations, and legal counsel. Many companies do not have sufficient expertise in-house, and subcontract some of these roles; often, these outside resources are provided by the cyber insurance policy. After a data breach becomes known to the company, the next steps typically include confirming it occurred, notifying the response team, and attempting to contain the damage. To stop exfiltration of data, common strategies include shutting down affected servers, taking them offline,
patching the vulnerability, and
rebuilding. Once the exact way that the data was compromised is identified, there is typically only one or two technical vulnerabilities that need to be addressed in order to contain the breach and prevent it from reoccurring. A
penetration test can then verify that the fix is working as expected. If
malware is involved, the organization must investigate and close all infiltration and exfiltration vectors, as well as locate and remove all malware from its systems. If data was posted on the
dark web, companies may attempt to have it taken down. Containing the breach can compromise investigation, and some tactics (such as shutting down servers) can violate the company's contractual obligations. Gathering data about the breach can facilitate later litigation or criminal prosecution, but only if the data is gathered according to legal standards and the
chain of custody is maintained. Database forensics can narrow down the records involved, limiting the scope of the incident. Extensive investigation may be undertaken, which can be even more expensive than
litigation. In the United States, breaches may be investigated by government agencies such as the
Office for Civil Rights, the
United States Department of Health and Human Services, and the
Federal Trade Commission (FTC). Law enforcement agencies may investigate breaches although the hackers responsible are rarely caught. Notifications are typically sent out as required by law. Many companies offer free
credit monitoring to people affected by a data breach, although only around 5 percent of those eligible take advantage of the service. Issuing new credit cards to consumers, although expensive, is an effective strategy to reduce the risk of
credit card fraud. Companies try to restore trust in their business operations and take steps to prevent a breach from reoccurring. ==Consequences==