What to Do After a Data Breach: Your Step-by-Step Business Response Guide for 2026

When a data breach hits, businesses need to respond quickly to curb the damage, meet compliance requirements, and get back to normal. Based on NIST SP 800-61 Rev. 3 and the FTC Data Breach Response Guide for Businesses, the process unfolds in six phases: preparation, detection and analysis, containment, eradication, recovery, and post-incident activity.

  1. Preparation: Set up an incident response policy, plan, and playbooks that define roles and include communication templates.
  2. Detection and Analysis: Pinpoint the breach's scope using monitoring tools and initial forensics.
  3. Containment: Isolate affected systems to prevent malware, viruses, or ransomware from spreading further, with targeted measures.
  4. Eradication: Fully remove threats from networks and devices.
  5. Recovery: Restore systems securely while watching for any signs of return.
  6. Post-Incident: Review what happened and weave the lessons into risk management practices.

This structured approach helps business owners, managers, and cybersecurity teams cut financial losses and satisfy regulations like the FTC’s Health Breach Notification Rule. Organizations with tested plans face 58% lower breach costs, per IBM's 2022 report, while robust plans save about $1.2 million, according to Ponemon Institute's 2021 findings.

Secure Your Response with a Comprehensive Incident Response Plan

A well-crafted incident response plan reduces breach costs by speeding up and coordinating the reaction. Businesses that test their plans regularly see 58% lower costs than those without, as IBM's 2022 analysis shows. Companies with strong teams and plans, meanwhile, trim expenses by roughly $1.2 million, per Ponemon Institute data from 2021.

Key elements, as recommended by the Fortinet CISO Collective, consist of three documents:

Include communication templates that specify who to notify, what to say, when to send messages, and how to do it securely. In 2026, aligning with NIST SP 800-61 Rev. 3 ties responses to broader risk management.

Build and Activate Your Incident Response Team

A data breach calls for a cross-functional team to coordinate effectively. The FTC suggests roles such as forensics, legal, information security, information technology, operations, human resources, communications, investor relations, and management, adjusted for company size and type.

Steps to assemble and activate the team:

Drawn from FTC and SentinelOne guidance, this setup keeps responses focused and efficient.

Follow the NIST-Inspired Response Workflow

After a breach, follow NIST phases for a systematic effort. NIST SP 800-61 Rev. 3, updated in 2025, restructures advice to match Cybersecurity Framework 2.0, weaving incident response into risk management.

Fortinet and SentinelOne stress playbooks for these phases to provide tactical guidance without slowing things down.

Comply with FTC Guidance and Reach All Stakeholders

FTC rules demand precise communication to manage legal and financial risks. Follow the Health Breach Notification Rule with plans that cover employees, customers, investors, business partners, and other stakeholders.

These measures from FTC guidance promote transparency while safeguarding business interests.

Choose the Right Framework: NIST vs. FTC for Your Business

Picking between NIST SP 800-61 Rev. 3 and FTC guidance hinges on business size, sector, and goals. NIST prioritizes risk management integration, while FTC stresses compliance and notifications.

Aspect NIST SP 800-61 Rev. 3 (2025) FTC Data Breach Response Guide
Focus Risk management, CSF 2.0 alignment, ongoing "Improve" Compliance (e.g., Health Breach Notification Rule), stakeholder plans
Team Scale Scalable for any size; cross-functional with playbooks Flexible roles (forensics, legal, IT, HR, comms) based on company size
Key Phases Preparation, detection/analysis, containment, eradication, recovery, post-incident/Improve Team activation, investigation, notification to employees/customers/partners

In 2026, smaller firms might lean on FTC for straightforward compliance, while larger ones combine both for fuller protection. Tailor the choice to your needs--NIST for technical detail, FTC for regulatory essentials.

FAQ

What are the first steps to take immediately after detecting a data breach?
Activate your incident response team, initiate detection and analysis to scope the breach, and move to containment tactics like isolating systems to stop threats.

How does having a tested incident response plan lower breach costs?
Tested plans enable faster response, reducing costs by 58% per IBM's 2022 report, and robust plans save about $1.2 million according to Ponemon Institute's 2021 data.

What roles should be on a data breach response team?
Include forensics, legal, information security, IT, operations, HR, communications, investor relations, and management, scaled to your business, as FTC advises.

What's new in NIST SP 800-61 Rev. 3 for incident response in 2026?
The 2025 revision aligns with CSF 2.0 for risk integration, expands "Improve" beyond post-incident meetings, and prompts monitoring questions like "What do we monitor, and why?"

Do FTC rules apply to all businesses during a data breach?
FTC guidance, including the Health Breach Notification Rule, applies broadly, requiring stakeholder plans for employees, customers, investors, and partners.

How do incident response playbooks differ from a general plan?
Playbooks provide detailed, phase-specific tactics (e.g., NIST stages like containment for malware), while the general plan covers strategy, roles, and high-level processes.

Review your current plan against these frameworks, test it annually, and update for 2026 regulations to stay prepared.