Blog & Newsroom

7 Things to Do if Your Business Systems Get Hacked

by | 30 Oct | account systems, cybersecurity

Data breaches have been in the news of late. They range from seemingly minor incidents to those which affected hundreds of thousands of customers at companies

7 things to do if your business gets hacked

like search engine giant Google. The breaches can be relatively innocuous, such as an email address being exposed; to critical, where clients’ sensitive data is exposed and monetary losses are realized. Exposing your clients’ data can strain relationships and even put your business’s survival at risk if they are severe enough.

So what should you do if you’ve been hacked? Here is our list of 7 things you should do before/after you discover you’ve been hacked:

1. Be prepared – You should have a plan in place prior to any adverse event. Develop and stress test your disaster communications BEFORE anything negative occurs. This plan should have a list of potential events that would require an immediate and measured statement from the company.

2. Data theft can shut down your business for weeks or months while IT experts work to re-secure your network. You’ll need to do serious damage control with your existing customers, and create ways to keep sales channels open. These might include having a backup network or reverting to old-fashioned methods of selling, such as taking orders by phone or paper.

3. Know the law – There are serious potential consequences in failing to properly report and manage a data breach. Make sure you know the applicable state and federal laws as well as who must be notified and how quickly this must occur.

4. Inform your clients – As soon as you become aware of a breach, notify your clients. You should make them aware as soon as practicably possible. The only exception is when law enforcement is involved and has specifically instructed you not to disclose the breach. Every customer should be notified in writing. The written notification should inform them of the time, nature and extent of the breach and what data was exposed.

5. It is also advisable to set up a dedicated phone line to handle customer inquiries related to the breach. Most companies elect to pay for a subscription service to one of the credit monitoring services. Be advised that certain states (California for example) require that a specific template and verbiage be used when a certain number of parties are affected.

6. File appropriate notifications – Notify local and federal law enforcement; the level of their involvement will depend on the size, scope and nature of the breach. State law may also require you to notify the state attorney general’s office. Some regulated industries have specific rules related to notifications. For example, companies regulated by the SEC, FINRA or that fall under HIIPA have specific protocols for handling data breaches.

7. Call in an expert – Forensics and cyber security teams can determine how a breach happened, and in some cases even who did it. Most importantly, they can help harden your defenses and take steps to reduce the likelihood of a recurrence.

8. Consider getting cyber insurance – Some specialty insurers offer cyber insurance which indemnifies the company against losses related to a breach. The cost of this insurance can vary by state, industry and company size. Cyber insurance may also reimburse a firm for the cost of remediation of system(s) and providing credit monitoring.

  • Implement IT best practices – If individuals have access to import systems or IT infrastructure, they should be following best practices. Frequent changes of passwords and the use of complex, non-reusable passwords is a must. Restrict the use of unapproved programs and media from the network. Computers should use locking screensavers and be physically secured when not in use. Guest Wi-Fi should be segregated from business networks. Key servers and network infrastructure should be kept in a physically secure, failsafe environment.

 

Thoughtful advanced planning can go a long way towards securing your organization against hackers, ransom seekers and ne’er-do-wells. But if a breach does happen, act swiftly and control the situation as quickly and thoroughly as possible.

Since 1938, Zinner has counseled individuals and businesses from start-up to succession. At Zinner, we strive to ensure we understand your business and recognize threats that could impact your financial situation.
DOL Proposes New Independent Contractor Rule

What Employers and Workers Should Know The U.S. Department of Labor’s Wage and Hour Division announced a proposed rule intended to clarify when a worker is an employee and when the worker may be classified as an independent contractor under the Fair Labor Standards...

USPS Postmark Changes

A Tax Filing Risk Alert for Taxpayers For decades, many taxpayers have relied on a simple rule of thumb: if it is in the mail by the deadline, you are fine. However, recent U.S. Postal Service (USPS) clarification makes that assumption riskier. On Dec. 24, 2025, the...

Top Security Issues Tax Clients Must Watch Out for in 2026

Tax season has always been a prime opportunity for scammers, and 2026 is emerging as one of the most dangerous years yet. With increased filing confusion, AI‑powered fraud tactics, and a surge in data breaches fueling identity theft, tax clients need to be more...

Zinner & Co. Volunteers at Cleveland Food Bank Healthy Choice Market

On Jan. 22, Zinner & Co. employees spent the afternoon volunteering at the Greater Cleveland Food Bank’s Community Resource Center Healthy Choice Market. Our team was proud to support neighbors directly by helping make the shopping experience easier, more...

No Tax on Overtime Pay

The recently enacted One Big Beautiful Bill Act introduces a major change to the federal tax code, delivering welcome news for both employees and employers for tax years 2025 through 2028, as qualified overtime pay will not be subject to Federal income tax. This...

Send us your questions and we’ll share our insights with you on our blog!

Share Your Idea For 
A Zinner Blog Article