Beyond Denial

Why honesty is the best response to a data breach

By Kevin Robertson | Jul 16, 2025
Shutterstock

Opinions expressed by Entrepreneur contributors are their own.

You're reading Entrepreneur United Kingdom, an international franchise of Entrepreneur Media.

Hackers claim they have breached a large company and stolen millions of sensitive files. The victim initially stays silent, then denies any breach. Journalists receive evidence confirming the hack, yet the tech company insists it is not as it appears. Onlookers are confused and suspicious: is the company justified, or merely stalling?

Days later, the company emails customers with a vaguely worded confirmation of a data breach, lacking details. The message downplays the incident using ambiguous technical language to soften the admission. The company assures users it is nothing to worry about, but concerns persist. Was this a notifiable breach? Is my data affected? Answers should be straightforward, yet in many real-world cases, they are elusive.

Welcome to a world where truth collapses under disinformation, hearsay, and claims and counterclaims. Nobody knows what to believe, which might be the point. However, evasion and denial carry costs.

Playing for Time
From the breach report to acceptance, two weeks elapsed, leaving customers uninformed and at risk. Attackers exploited stolen data freely . Speculation wasted time, and social media amplified reputational damage. This imaginary example is a blueprint for poor cyber incident handling. Suffering an attack is not failure, but denying it has occurred against all evidence, then admitting it later, erodes trust long-term. What can organisations learn to improve their responses?

Breach Response Playbook: A Guide to Smart Communication
Cyber attacks burden today’s digital economy. As organisations move their operations online, this offers numerous opportunities for criminals to breach their infrastructure, which is one of the key reasons why cyber crime is surging today. Criminals gain more targets, fuelling cyber crime growth. Defending through continuous monitoring and state-of-the-art security tools is vital, but preparing for breaches and knowing obligations is equally important.

Here are best practices for managing and communicating cyber attacks:

Transparency is Paramount
Transparency builds trust. Communicate clearly and promptly if a breach is suspected or confirmed. While not all information can be publicly shared, it’s best to let shareholders and customers know upon breach discovery, especially if they could be impacted.

Don’t Deny Unless Absolutely Certain
Avoid blanket denials unless 100% sure no breach occurred. Premature denials damage credibility, undermine security perceptions, and expose stakeholders. Often, it is better to stay silent until understood, or state that claims are being seriously investigated.

Run Forensics to Understand Scope
Running effective forensics quickly is essential, as this is critical to understand how attackers got in, what they touched, if they are still present on the network and what needs to be done to mitigate their access.

Inform Regulators
Understand the regulatory requirements for reporting personal data breaches for all the regions the business operates in. In the UK, it’s essential to report personal data breaches to the ICO within 72 hours; failure invites fines and added costs.

Have Well-Rehearsed Incident Response Plans
Maintain rehearsed plans for response, recovery, and service resumption. These should allow service disruptions if needed, with technologies configured for worst-case scenarios and strong detection.

Provide Informative Updates
Provide timely, accurate updates to customers, partners and investors. Don’t leave stakeholders guessing and always ensure the information provided is applicable to the audience it’s being delivered to. Consumers don’t always need to understand the technicalities or how a breach unfolded and technical jargon will confuse them. Ensure communications are regular, informative and stamp out misinformation and speculation, which can cause reputational damage.

Document Everything
Document every action taken during the breach response. This helps with regulatory reviews, internal audits and post-incident analysis.

Learn for Future Survival
After the incident is resolved, conduct a post-mortem review. Identify what went wrong, what worked and how your security and response strategies can be improved. Assess successes, improvements, and strategy changes. Lessons learned should be holistic, not just negative-focused.

Cyber attacks are a reality in our connected world, offering criminals more vulnerabilities to exploit. Yet a breach need not be disastrous. Those delaying, denying, or deflecting face lasting consequences. Remember, breach response affects the long term beyond initial crisis. While public attention fades, effects linger. A breach is bad news but a weak response worsens it. Organisations that respond swiftly, honestly and strategically will emerge stronger.

Hackers claim they have breached a large company and stolen millions of sensitive files. The victim initially stays silent, then denies any breach. Journalists receive evidence confirming the hack, yet the tech company insists it is not as it appears. Onlookers are confused and suspicious: is the company justified, or merely stalling?

Days later, the company emails customers with a vaguely worded confirmation of a data breach, lacking details. The message downplays the incident using ambiguous technical language to soften the admission. The company assures users it is nothing to worry about, but concerns persist. Was this a notifiable breach? Is my data affected? Answers should be straightforward, yet in many real-world cases, they are elusive.

Welcome to a world where truth collapses under disinformation, hearsay, and claims and counterclaims. Nobody knows what to believe, which might be the point. However, evasion and denial carry costs.

Kevin Robertson

CTO of Acumen Cyber
Kevin Robertson, CTO of Acumen Cyber

Related Content

Technology

How Ritesh Kakkad and Atul Khekade Build Trade-Focused Web3 Rails

Most people who have waited days for an international payment to clear know that ‘instant’ money often travels at a walking pace. That slow, uneven reality sits behind the work of Ritesh Kakkad and Atul Khekade, co-founders of the institutional-grade blockchain platform XDC Network. The duo now spends their time rethinking how digital infrastructure may […]
Business News

Live Smarter, Stay Closer: How Wavee Ai Drives Real Connection

They say, “No man is an island.” And nowhere is this more evident than in large residential buildings where hundreds of people cross paths every day. In the digital age, the quality of building life isn’t measured in square footage; it’s defined by the small moments of connection: a neighbour offering help, a local vendor […]
Technology

ElevenLabs AI Voice Agents Shift Perspectives on Automation in Business

Artificial intelligence (AI) agents are finding a place in modern business operations, albeit limited by their capacity for natural communication. Companies intent on global scaling interact with international customers in a range of contexts, requiring efficient and consistent communication. Elevenlabs is working to reorient perspectives on automation, contributing toward a productive future for AI voice […]