Business A.M
No Result
View All Result
Thursday, February 12, 2026
  • Login
  • Home
  • Technology
  • Finance
  • Comments
  • Companies
  • Commodities
  • About Us
  • Contact Us
Subscribe
Business A.M
  • Home
  • Technology
  • Finance
  • Comments
  • Companies
  • Commodities
  • About Us
  • Contact Us
No Result
View All Result
Business A.M
No Result
View All Result
Home Analyst Insight

Incident or Breach? Meanings and responses

by Chris
January 21, 2026
in Analyst Insight

Good breach management and incident response systems form core aspects of a robust data protection framework. There is a wide range of ways to respond to a breach. In this week’s piece, I will highlight how to respond to breaches.

First, I must state that there is a difference between a breach and an incident. All breaches are incidents, but not all incidents are breaches. Only the privacy office, the IT team or the legal and compliance departments within the company can declare a breach based on some specific triggers.

Breaches are events that place the lives and freedoms of individuals at risks like identity theft, fraud and misrepresentation. In contrast, an incident is a situation which affects the confidentiality, integrity or availability of personal information and usually doesn’t lead to the loss of freedom. Most times, companies don’t have to report incidents to data protection authorities, but they should record the event for lessons. 

How can companies prepare for data breaches?

Companies don’t have to wait for breaches to happen. It’s about when they happen, how prepared is the company and its staff for the event. Preparedness does not prevent incidents from happening, but it focuses on the people, process and technology that prevent a breach from happening. In other words, breach preparedness focuses on measures a company can take to respond when prevention fails.

First, training comes to play here, which is pretty straightforward and significant. Training exposes gaps in pre-incident and procedure plans. It creates ground for the security of customers, partners and employees. If the right personnel are trained about their duties when a breach does happen, it lowers the legal and notification costs that might occur as a result of the breach. Training holds a strong case in the role of the breach management schemes of the preparation phase of the data breach management procedure.

Much more than that, company stakeholders should determine business functions that require in-depth training. For example, when there is a breach in a particular bank, how should customer care handle incoming calls and emails? What should they say to disgruntled or affected customers?

Each function of the business must know what and how they will handle incidents once they occur. This training can take different forms, and the content must be customised to meet the various demands of the multiple functions of the business. It can be virtual or through office intranet.

With regards to training too, various departmental heads must know what to say to the press. The CEO of the bank in question must choose her words carefully to avoid adding fodder to litigations.

The response to a breach is usually complicated. However, a company that has positioned itself with the right trained staff, created the right process and acquired the right technological stack to handle various incidents will handle breaches and incidents with ease. Companies facing a potential deal with breaches detection, ensure that stakeholders collaborate and know their roles, investigate, ask their legal teams to conduct analysis, address reporting obligations, and come up with a way to recover from the situation.

There are critical areas that stakeholders must attend to broadly when there is a breach. When a breach happens, there is usually a colossal scampering for the right steps to take. Like I have said before in this space, preparation would help the company take the right steps and then focus on securing the operation of the business. Because there is a breach doesn’t mean that business operations should stop. A sound breach management methodology would maintain business continuity and prevent the company from running at a loss and delivering products and services to the customers.

The company should also put notification strategy into its breach response and the cost implications. Usually, companies can communicate via email, post or use social media platforms. The company should look for a cost-effective way to reach the affected customers.

And the final issue would be to focus on locating the vulnerabilities, fixing it immediately by working with the various functions of the business, primarily where a weakness existed, and work on the best way to strengthen the gaps.

These are no specific steps. However, companies must understand the difference between an incident and a breach and be prepared to handle violations when they do happen.

Previous Post

P+ Measurement Services elevates Odiakose, Animashaun, targets optimum efficiency

Next Post

Ending conflicts and food crisis in Africa

Next Post

Ending conflicts and food crisis in Africa

  • Trending
  • Comments
  • Latest
Igbobi alumni raise over N1bn in one week as private capital fills education gap

Igbobi alumni raise over N1bn in one week as private capital fills education gap

February 11, 2026
SIFAX subsidiary bets on operational discipline, cargo diversification to drive recovery at Lagos terminal

SIFAX subsidiary bets on operational discipline, cargo diversification to drive recovery at Lagos terminal

February 10, 2026
inDrive turns to advertising revenues as ride-hailing economics push platforms toward diversification

inDrive turns to advertising revenues as ride-hailing economics push platforms toward diversification

February 10, 2026
Egbin Power targets youth employability with tech skills initiative

Egbin Power targets youth employability with tech skills initiative

February 10, 2026

6 MLB teams that could use upgrades at the trade deadline

Top NFL Draft picks react to their Madden NFL 16 ratings

Paul Pierce said there was ‘no way’ he could play for Lakers

Arian Foster agrees to buy books for a fan after he asked on Twitter

JOHN ONYEUKWU

When applause travels faster than hunger

February 12, 2026
OLUSOJI ADEYEMO

Digital workers automating SME hustle without killing jobs

February 12, 2026

Virtual playground, real perils: A parent’s guide to Roblox and the Metaverse

February 12, 2026
EKELEM AIRHIHEN

Transforming African aviation with biometric trends in 2026

February 12, 2026

Popular News

  • Igbobi alumni raise over N1bn in one week as private capital fills education gap

    Igbobi alumni raise over N1bn in one week as private capital fills education gap

    0 shares
    Share 0 Tweet 0
  • SIFAX subsidiary bets on operational discipline, cargo diversification to drive recovery at Lagos terminal

    0 shares
    Share 0 Tweet 0
  • inDrive turns to advertising revenues as ride-hailing economics push platforms toward diversification

    0 shares
    Share 0 Tweet 0
  • Egbin Power targets youth employability with tech skills initiative

    0 shares
    Share 0 Tweet 0
  • Reps summon Ameachi, others over railway contracts, $500m China loan

    0 shares
    Share 0 Tweet 0
Currently Playing

CNN on Nigeria Aviation

CNN on Nigeria Aviation

Business AM TV

Edeme Kelikume Interview With Business AM TV

Business AM TV

Business A M 2021 Mutual Funds Outlook And Award Promo Video

Business AM TV

Recent News

JOHN ONYEUKWU

When applause travels faster than hunger

February 12, 2026
OLUSOJI ADEYEMO

Digital workers automating SME hustle without killing jobs

February 12, 2026

Categories

  • Frontpage
  • Analyst Insight
  • Business AM TV
  • Comments
  • Commodities
  • Finance
  • Markets
  • Technology
  • The Business Traveller & Hospitality
  • World Business & Economy

Site Navigation

  • Home
  • About Us
  • Contact Us
  • Privacy & Policy
Business A.M

BusinessAMLive (businessamlive.com) is a leading online business news and information platform focused on providing timely, insightful and comprehensive coverage of economic, financial, and business developments in Nigeria, Africa and around the world.

© 2026 Business A.M

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Technology
  • Finance
  • Comments
  • Companies
  • Commodities
  • About Us
  • Contact Us

© 2026 Business A.M