{"id":11277,"date":"2016-07-13T09:01:59","date_gmt":"2016-07-13T14:01:59","guid":{"rendered":"https:\/\/www.hostgator.com\/blog\/?p=11277"},"modified":"2017-05-09T11:07:33","modified_gmt":"2017-05-09T16:07:33","slug":"data-breach-plan","status":"publish","type":"post","link":"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/","title":{"rendered":"You Think You\u00e2\u20ac\u2122ve Had a Data Breach. What\u00e2\u20ac\u2122s Your Plan?"},"content":{"rendered":"<p class=\"p1\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-11438\" src=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Data-Breach.png\" alt=\"Data Breach\" width=\"1201\" height=\"629\" srcset=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Data-Breach.png 1201w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Data-Breach-300x157.png 300w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Data-Breach-768x402.png 768w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Data-Breach-1024x536.png 1024w\" sizes=\"(max-width: 1201px) 100vw, 1201px\" \/><\/p>\n<p class=\"p1\">If you think your business is safe from prying hackers because it\u2019s small, think again. <span class=\"s2\">Seventy-one percent<\/span> of breaches involve small businesses, and only 20% of those businesses survive more than 18 months after a breach, according to <a href=\"http:\/\/www.businessnewsdaily.com\/8001-have-you-been-hacked-how-to-recover-from-a-data-breach.html\" target=\"_blank\"><em>Business News Daily<\/em><\/a>. Because the likelihood of a business-ending breach is so high, your business needs a response plan to not only improve your response time but also reduce your company\u2019s breach-related losses. Here\u2019s how to create your data-breach response plan.<\/p>\n<p class=\"p3\"><span class=\"s3\">First, do your pre-planning homework. You can reduce your chances of falling prey to data thieves by keeping your company\u2019s operating system and application software up to date, practicing <a href=\"https:\/\/www.hostgator.com\/passwords\">good password<\/a> security habits, and guarding against phishing attacks and equipment theft. It\u2019s also an excellent idea to insure your business against data theft. <\/span><span class=\"s1\">More than <span class=\"s2\">95%<\/span> of small businesses don\u2019t carry data breach insurance, although policies are available through many major insurers. Going without coverage can be a costly mistake. According to data from the <a href=\"http:\/\/www.nsba.biz\/wp-content\/uploads\/2013\/09\/Technology-Survey-2013.pdf\" target=\"_blank\">National Small Business Association<\/a>, the average small-business data breach <span class=\"s2\">cost $8,699<\/span> in 2013. Buy a policy now and the cost of the breach will be one less thing to worry about as you deal with the rest of the steps on this list. <\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Step 1: Know there\u2019s been a breach<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">The ugly truth about data theft is that skilled criminals can ransack your company data and leave   or worse, hang around in your system collecting data as it arrives   without dropping clues most of us can spot. That\u2019s why so many companies learn about their system breaches from outside sources like banks and customers. If you get such a report, take it seriously and activate your response plan right away. If your security software shows an infection, it\u2019s also time to act.<\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Step 2: Isolate the problem<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">Regardless of how you learn about your suspected or confirmed breach, you\u2019ll need to figure out which computers and\/or servers are compromised. Take them off your business network   physically unplug their Ethernet cables or wireless adapters   and disconnect them from the Internet. Put this equipment off-limits for business use, but don\u2019t turn it off. The <a href=\"https:\/\/www.pcisecuritystandards.org\/documents\/PCI_SSC_PFI_Guidance.pdf\" target=\"_blank\">PCI Security Standards Council<\/a> <span class=\"s2\">advises<\/span> that powering down infected equipment 'may make investigation more difficult and remove answers you need.'\u009d<\/span><\/p>\n<h2 class=\"p3\"><strong><span class=\"s1\">Step 3: Save access and activity logs<\/span><\/strong><\/h2>\n<p class=\"p3\"><span class=\"s1\">This is the step when enterprise-level businesses bring in the IT <a href=\"https:\/\/www.experian.com\/assets\/data-breach\/brochures\/response-guide.pdf\" target=\"_blank\"><span class=\"s2\">forensics experts<\/span><\/a> to see who\u2019s had system access and what they did. You may not have a team, but you can appoint someone on your staff ahead of time to <span class=\"s2\">back up and save<\/span> the logs from each piece of compromised equipment and from your network in the event of a breach. You may not ever learn exactly which data was compromised, but keeping a record of the logs is the best possible start and will be critical if law enforcement or card issuers launch an investigation.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">If you\u2019re a solopreneur without the know-how to do this kind of backup, start looking now for computer-security businesses in your area that can do this for you and talk to them about their services, rates, and policies. <\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Step 4: Inform your payment and banking partners <\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">Any time your customers\u2019 payment data is at risk, you need to notify your payment processor, merchant bank, and the major credit card issuers right away. Your processor and bank will step up monitoring and review of your orders. Depending on the volume of credit card transactions your business generates, the card issuers may want to launch a forensics investigation led by a PCI-approved professional. Know the time limits your payment partners set for breach reporting and follow them. Late reporting can increase your liability for breach losses.<\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Step 5: Notify law enforcement<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">Depending on where you do business, you may be required to notify law enforcement in the event of a suspected or confirmed breach. Whether you\u2019re required to or not, both the <a href=\"https:\/\/www.ftc.gov\/tips-advice\/business-center\/guidance\/information-compromise-risk-identity-theft-guidance-your\" target=\"_blank\"><span class=\"s2\">Federal Trade Commission<\/span><\/a> and the <span class=\"s2\">Better Business Bureau<\/span> recommend that you contact your local police department, state law enforcement, or the FBI to report the breach. <\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Step 6: Contact your insurer<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">Remember that insurance policy you bought before step one? Contact your agent and provide as much information as you can about the breach, including any case numbers assigned by the police or FBI.<\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Step 7: Call the credit bureaus<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">If your business stores customers\u2019 personally identifiable information, payment data, or social security numbers, you should also notify the three major credit bureaus (<span class=\"s2\">Experian, Equifax, and TransUnion<\/span>) so they can flag customers\u2019 files.<\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Step 8: Tell your customers<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">This step makes many business owners wince, but transparency is the best policy. It\u2019s also the law in most states and major territories. (The National Council of State Legislatures keeps a <a href=\"http:\/\/www.ncsl.org\/research\/telecommunications-and-information-technology\/security-breach-notification-laws.aspx\" target=\"_blank\"><span class=\"s2\">current list of state and territory breach laws<\/span><\/a> you can check.) Be upfront when you contact your customers. Experian <a href=\"https:\/\/www.experian.com\/assets\/data-breach\/brochures\/response-guide.pdf\" target=\"_blank\"><span class=\"s2\">advises<\/span><\/a> businesses that 'consumers want to see facts about the breach, information about the risks they may face, steps they can take to protect themselves.'\u009d Give details if you have them. If you\u2019re unsure what information was stolen, say so. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">The <span class=\"s2\">FTC<\/span> and state governments that require consumer notification of breaches offer sample letters you can adapt, like <a href=\"http:\/\/www.mass.gov\/ago\/docs\/consumer\/93h-sampleletter-residents.pdf\" target=\"_blank\"><span class=\"s2\">this one<\/span><\/a> from the Massachusetts Attorney General\u2019s Office. <\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Step 9: Tighten your security<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">Learn all you can from the data breach to figure out where your business is vulnerable and how to prevent a repeat incident. Cooperate with any investigators working on your case and let your customers know that you\u2019re strengthening your protection of their data. Keep your data breach insurance policy paid up.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Want more tips on protecting your small business? Check out these HostGator blog posts on <a href=\"https:\/\/www.hostgator.com\/blog\/2015\/11\/04\/3-security-plugins-for-wordpress-to-keep-your-blog-safe\/\"><span class=\"s2\">WordPress site security<\/span><\/a> tools and how to set up <a href=\"https:\/\/www.hostgator.com\/blog\/2014\/10\/20\/cyber-security-toolkit-small-business\/\"><span class=\"s2\">security levels<\/span><\/a> to protect your information.\u00a0<\/span><\/p>\n<p class=\"p3\">Hackers don&#8217;t just attack your physical servers. They go after websites, too. Protect your site from malware with <a href=\"https:\/\/www.hostgator.com\/sitelock\">SiteLock<\/a>, and restore your site with daily backups from <a href=\"https:\/\/www.hostgator.com\/codeguard\">CodeGuard<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you think your business is safe from prying hackers because it\u2019s small, think again. Seventy-one percent of breaches involve&#8230;<\/p>\n","protected":false},"author":162,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[98],"tags":[],"class_list":["post-11277","post","type-post","status-publish","format-standard","hentry","category-startup-small-business"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.2 (Yoast SEO v23.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>You Think You\u00e2\u20ac\u2122ve Had a Data Breach. What\u00e2\u20ac\u2122s Your Plan? - HostGator<\/title>\n<meta name=\"description\" content=\"If you think your business is safe from prying hackers because it\u00e2\u20ac\u2122s small, think again. 71% percent of breaches involve small business. Here&#039;s how to deal.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"You Think You\u00e2\u20ac\u2122ve Had a Data Breach. What\u00e2\u20ac\u2122s Your Plan?\" \/>\n<meta property=\"og:description\" content=\"If you think your business is safe from prying hackers because it\u00e2\u20ac\u2122s small, think again. 71% percent of breaches involve small business. Here&#039;s how to deal.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/\" \/>\n<meta property=\"og:site_name\" content=\"HostGator\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HostGator\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-13T14:01:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-05-09T16:07:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Data-Breach.png\" \/>\n<meta name=\"author\" content=\"Casey Kelly-Barton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@HostGator\" \/>\n<meta name=\"twitter:site\" content=\"@HostGator\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Casey Kelly-Barton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/\"},\"author\":{\"name\":\"Casey Kelly-Barton\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/4c68d74801037eb3f313d8a456d6506a\"},\"headline\":\"You Think You\u00e2\u20ac\u2122ve Had a Data Breach. What\u00e2\u20ac\u2122s Your Plan?\",\"datePublished\":\"2016-07-13T14:01:59+00:00\",\"dateModified\":\"2017-05-09T16:07:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/\"},\"wordCount\":1008,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Data-Breach.png\",\"articleSection\":[\"Startup &amp; Small Business\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/\",\"url\":\"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/\",\"name\":\"You Think You\u00e2\u20ac\u2122ve Had a Data Breach. What\u00e2\u20ac\u2122s Your Plan? - HostGator\",\"isPartOf\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Data-Breach.png\",\"datePublished\":\"2016-07-13T14:01:59+00:00\",\"dateModified\":\"2017-05-09T16:07:33+00:00\",\"description\":\"If you think your business is safe from prying hackers because it\u00e2\u20ac\u2122s small, think again. 71% percent of breaches involve small business. Here's how to deal.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/#primaryimage\",\"url\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Data-Breach.png\",\"contentUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Data-Breach.png\",\"width\":1201,\"height\":629,\"caption\":\"Data Breach\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hostgator.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"You Think You\u00e2\u20ac\u2122ve Had a Data Breach. What\u00e2\u20ac\u2122s Your Plan?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#website\",\"url\":\"https:\/\/www.hostgator.com\/blog\/\",\"name\":\"HostGtaor\",\"description\":\"Web Hosting and Marketing Tips for Entrepreneurs\",\"publisher\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hostgator.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#organization\",\"name\":\"HostGtaor\",\"url\":\"https:\/\/www.hostgator.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png\",\"contentUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png\",\"width\":1092,\"height\":215,\"caption\":\"HostGtaor\"},\"image\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/HostGator\",\"https:\/\/x.com\/HostGator\",\"https:\/\/www.instagram.com\/hostgator\",\"https:\/\/www.linkedin.com\/company\/hostgator-com\",\"https:\/\/www.pinterest.com\/hostgator\/\",\"https:\/\/www.youtube.com\/user\/hostgator\"],\"email\":\"support@gator.com\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/4c68d74801037eb3f313d8a456d6506a\",\"name\":\"Casey Kelly-Barton\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/65d330a9fbb7308264432649d5324f2b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/65d330a9fbb7308264432649d5324f2b?s=96&d=mm&r=g\",\"caption\":\"Casey Kelly-Barton\"},\"description\":\"Casey Kelly-Barton is an Austin-based freelance B2B content marketing writer. Her specialty areas include SMB marketing and growth, data security, IoT, and fraud prevention\",\"sameAs\":[\"http:\/\/caseykellybarton.com\/\"],\"url\":\"https:\/\/www.hostgator.com\/blog\/author\/caseykb\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"You Think You\u00e2\u20ac\u2122ve Had a Data Breach. What\u00e2\u20ac\u2122s Your Plan? - HostGator","description":"If you think your business is safe from prying hackers because it\u00e2\u20ac\u2122s small, think again. 71% percent of breaches involve small business. Here's how to deal.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/","og_locale":"en_US","og_type":"article","og_title":"You Think You\u00e2\u20ac\u2122ve Had a Data Breach. What\u00e2\u20ac\u2122s Your Plan?","og_description":"If you think your business is safe from prying hackers because it\u00e2\u20ac\u2122s small, think again. 71% percent of breaches involve small business. Here's how to deal.","og_url":"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/","og_site_name":"HostGator","article_publisher":"https:\/\/www.facebook.com\/HostGator","article_published_time":"2016-07-13T14:01:59+00:00","article_modified_time":"2017-05-09T16:07:33+00:00","og_image":[{"url":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Data-Breach.png"}],"author":"Casey Kelly-Barton","twitter_card":"summary_large_image","twitter_creator":"@HostGator","twitter_site":"@HostGator","twitter_misc":{"Written by":"Casey Kelly-Barton","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/#article","isPartOf":{"@id":"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/"},"author":{"name":"Casey Kelly-Barton","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/4c68d74801037eb3f313d8a456d6506a"},"headline":"You Think You\u00e2\u20ac\u2122ve Had a Data Breach. What\u00e2\u20ac\u2122s Your Plan?","datePublished":"2016-07-13T14:01:59+00:00","dateModified":"2017-05-09T16:07:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/"},"wordCount":1008,"commentCount":1,"publisher":{"@id":"https:\/\/www.hostgator.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Data-Breach.png","articleSection":["Startup &amp; Small Business"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hostgator.com\/blog\/data-breach-plan\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/","url":"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/","name":"You Think You\u00e2\u20ac\u2122ve Had a Data Breach. What\u00e2\u20ac\u2122s Your Plan? - HostGator","isPartOf":{"@id":"https:\/\/www.hostgator.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/#primaryimage"},"image":{"@id":"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Data-Breach.png","datePublished":"2016-07-13T14:01:59+00:00","dateModified":"2017-05-09T16:07:33+00:00","description":"If you think your business is safe from prying hackers because it\u00e2\u20ac\u2122s small, think again. 71% percent of breaches involve small business. Here's how to deal.","breadcrumb":{"@id":"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostgator.com\/blog\/data-breach-plan\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/#primaryimage","url":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Data-Breach.png","contentUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Data-Breach.png","width":1201,"height":629,"caption":"Data Breach"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hostgator.com\/blog\/"},{"@type":"ListItem","position":2,"name":"You Think You\u00e2\u20ac\u2122ve Had a Data Breach. What\u00e2\u20ac\u2122s Your Plan?"}]},{"@type":"WebSite","@id":"https:\/\/www.hostgator.com\/blog\/#website","url":"https:\/\/www.hostgator.com\/blog\/","name":"HostGtaor","description":"Web Hosting and Marketing Tips for Entrepreneurs","publisher":{"@id":"https:\/\/www.hostgator.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostgator.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hostgator.com\/blog\/#organization","name":"HostGtaor","url":"https:\/\/www.hostgator.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png","contentUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png","width":1092,"height":215,"caption":"HostGtaor"},"image":{"@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/HostGator","https:\/\/x.com\/HostGator","https:\/\/www.instagram.com\/hostgator","https:\/\/www.linkedin.com\/company\/hostgator-com","https:\/\/www.pinterest.com\/hostgator\/","https:\/\/www.youtube.com\/user\/hostgator"],"email":"support@gator.com"},{"@type":"Person","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/4c68d74801037eb3f313d8a456d6506a","name":"Casey Kelly-Barton","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/65d330a9fbb7308264432649d5324f2b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/65d330a9fbb7308264432649d5324f2b?s=96&d=mm&r=g","caption":"Casey Kelly-Barton"},"description":"Casey Kelly-Barton is an Austin-based freelance B2B content marketing writer. Her specialty areas include SMB marketing and growth, data security, IoT, and fraud prevention","sameAs":["http:\/\/caseykellybarton.com\/"],"url":"https:\/\/www.hostgator.com\/blog\/author\/caseykb\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts\/11277"}],"collection":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/users\/162"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/comments?post=11277"}],"version-history":[{"count":7,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts\/11277\/revisions"}],"predecessor-version":[{"id":16737,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts\/11277\/revisions\/16737"}],"wp:attachment":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/media?parent=11277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/categories?post=11277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/tags?post=11277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}