lutz logo
lutz logo
  • Services
  • News & Insights
  • About
  • Client Portal
Search
  • Services
  • Accounting
  • Advisory
  • Financial
  • M&A
  • Talent
  • Tech
  • Accounting Services
Services
  • Audit & Assurance
  • Client Advisory Services
  • Outsourced Accounting
  • Tax
  • Business Valuation
  • Litigation Support & Forensic
View All
Industries
  • Agribusiness
  • Construction
  • Family Office
  • Healthcare
  • Manufacturing & Distribution
  • Nonprofit
View All
News & Insights
Estate Planning Guide
Guide
Estate Planning Guide

Protect what matters. Our Estate Planning Guide provides a thorough overview of the documents and strategies needed to secure your financial legacy.

Read More
  • Advisory Services
Services
  • Accounting
  • Financial
  • M&A
  • Talent
  • Tech
View All
Resources
The Art of Budgeting
Recording
The Art of Budgeting + Smart Saving Strategies
Learn how to get your finances under control and increase your savings! Hear real-life examples and best practices to secure a successful future.
Watch Now
Business Insights
Comparing Business Valuation Methods
Blog
Comparing Business Valuation Methods: Which is Right for You?
Valuation experts rely on three primary approaches to determine the value of a business: income approach, asset approach, and market approach.
Read More
  • Financial Services
Services
  • Financial Planning
  • Investment Advisory
  • Retirement Plan Services
  • Pooled Employer 401(k) Plan
View All
Resources
  • Lutz Financial Blog
  • Our Team
  • Client Portal
  • Charles Schwab Login
  • Send Files Securely
Contact Us
NEWS & INSIGHTS
Website Featured Content Images
Market Commentary
Financial Market Updates

Read our latest financial market updates and sign up to receive them straight to your inbox.

Read More
  • M&A Services
Services
  • Transaction Advisory
  • Business Valuation
  • Succession Planning
View All
Resources
Employee Stock Ownership Plan
Blog
Employee Stock Ownership Plan Benefits & Best Practices

Understanding how ESOPs work and whether your organization is a good fit is critical to determining if this exit plan aligns with your goals.

Read More
Business Insights
Red Flags & Deal Accelerators in Financial Due Diligence
Webinar Recording
Red Flags & Deal Accelerators in Financial Due Diligence
When it comes to buying or selling a business, financial due diligence can uncover both warning signs and opportunities that significantly impact value.
Read More
  • Talent Services
Services
  • Search & Staffing
  • Outsourced HR
  • HR Consulting
View All
Candidate Resources
  • Job Seeker Process
  • Current Opportunities
  • Lutz Internships
Contact Us
News & Insights
HR Solutions for Employee Experience
Blog
HR Solutions That Elevate the Employee Experience
For growing businesses, the phrase “employee experience” often gets reduced to surface-level perks, but the true meaning goes much deeper.
Read More
  • Tech Services
Services
  • Outsourced IT
  • Data Analytics
  • Digital Transformation
View All
Resources
Microsoft Copilot Explained
Blog
Microsoft 365 Series: Copilot Explained - Your New AI Assistant

For organizations using Microsoft 365, Copilot is quickly becoming one of the most impactful tools for AI in the workplace.

Read More
Business Insights
Untitled design (1)-Mar-08-2024-08-50-35-9527-PM
Video
Pella Client Testimonial
"I've used them for valuation work, stock transfers, hosting all of my technology, and now data analytics. I'd say they lead the pack in terms of anticipating what I'm going to need before I even know I need it."
View Now
Business Insights
BLOG
Explore Topics

Get the latest news and insights on relevant topics that matter most to you.

View All
Webinars & Events
Events
Register Today

Register for an upcoming event or access our library of on-demand recordings.

View All
Market Updates
COMMENTARY
Stay Informed

Catch up on market moves with our weekly update, featuring in-depth insights and analysis.

View All
Resources
EBOOKS & GUIDES
Download Now

Take a deep dive into challenging business topics with these free educational resources. 

View All
  • News & Insights
  • Business Insights
  • Webinars & Events
  • Market Updates
  • Resources
Business Insights
BLOG
Explore Topics

Get the latest news and insights on relevant topics that matter most to you.

View All
  • About
About

Lutz is a business solutions firm for people seeking a partner to help energize and heighten economic and organizational success.

Our Company
Our Team
Offices
Careers
Internships
Contact Us
  • Contact
Client Portal

Log in to your relevant client portal to access your account, upload documents, or make a payment.

Make a Payment
Accounting Client Portal
Financial Client Portal
Charles Schwab Login
Send Files Securely
QuickBooks Support
Contact Us
  • Cybersecurity

What to Do if Your Business Suffers a Data Breach

Matt Longenecker, Tech Director
June 1, 2021
What to Do if Your Business Suffers a Data Breach

Data breaches are becoming more common and increasingly expensive. Once your business suffers a data breach, you may spend a considerable amount of time and resources trying to restore customer confidence and recover lost revenue. This is why it is important to prepare your business for the unexpected. So, how do you respond if your business suffers a data breach? Here is what to know. 

 

1. DETERMINE THE TYPE OF DATA BREACH 

Once you have confirmed that a breach has occurred, you should start by investigating the incident. A thorough investigation will help you determine the type of data breach, whether sensitive information was exposed and the type of data that was compromised. Knowing this will help you understand the steps to minimize the damage and prevent similar attacks from happening in the future.

When assessing the breach, take time to identify the people who have access to the affected systems. Also, find out the origin and scope of the breach. How was it initiated? When did it happen? What computer systems and applications have been affected? Lastly, identify all the victims of the attack.

You will also need to close any potential gaps that could be exploited in future breaches. Ask yourself:

  • Did an employee accidentally send out or steal sensitive information?
  • Did an attacker compromise your network and steal information? 

For assistance, consider hiring a qualified professional to assess how the breach occurred and help protect you moving forward. There are also solutions that can be proactively installed on your computer systems known as Extended Detection and Response (XDR). An XDR solution can provide visibility across your network about how the breach occurred and where it is still active.

 

2. CONTAIN THE INCIDENT 

A critical part of your incident response plan should be eliminating the threat. Here, you will need to act swiftly to contain the breach. This will stop the attack from spreading, effectively ensuring other servers and devices do not get infected. Indeed, a slow response to a data breach can lead to bigger and more serious problems for your company. Because the nature of data breaches varies widely, you should consider working with outside counsel to determine the next steps. 

When looking to contain a data breach, there are several immediate actions you can take to prevent further damage. These include:

  • Referencing your XDR solution to help determine systems that should be contained.
  • Disconnecting affected systems from the network to prevent further data loss or spread, if possible.
  • Disabling remote access capability like VPN and potential wireless access.
  • Ensuring both onsite and offsite backups are disconnected from your compromised network.
  • Retrieving and restoring an uninfected backup copy of important data to a new network.

In the end, the right expert will effectively handle the more complex containment and ensure your network is properly secured against both current and similar future attacks.

 

3. MITIGATION STEPS 

After the data breach has been contained, you will have to improve your security posture. This will go a long way in helping to reduce the overall risk that your business is exposed to. Apart from continuously monitoring your network to detect threats, below are some tips to prevent data leaks. 

a. Change passwords 

Changing and strengthening your passwords will not only contribute to the cessation of an ongoing breach but also make it more difficult for hackers to access your network. Apart from implementing complex and secure passwords, you should avoid using the same passwords on multiple systems. 

b. Enable two-factor or multi-factor authentication

Making sure you have an added layer of security is a simple but effective way to prevent unauthorized access. For example, a username and password are considered a single form of authentication. Two-factor and multi-factor authentication will greatly improve security of your systems by requiring you to enter an additional code from an application on your phone or a text message. This makes it nearly impossible for an attacker to gain access to these systems.

c. Enable geo-blocking

Geo-blocking restricts access to your networks and computers from certain locations. Restricting access from foreign countries is a great way to protect your digital assets and improve cybersecurity.

 

4. REMEDIATION STEPS 

Your continuity plan will not be complete without including ways to remedy the situation. Taking the appropriate remediation steps will allow you to resume your operations sooner and more securely. Here is what you need to focus on. 

a. Do systems need to be rebuilt? 

You should work with professionals to establish whether your systems need to be rebuilt. The experts will assess the damage before recommending the right course of action to take. In case you have to rebuild your systems, all vulnerabilities that could lead to future breaches should be fixed. 

b. Reexamine your security measures 

To keep attackers at bay, you must determine what action you can take to prevent data breaches in the future. This may include updating software regularly, conducting employee security awareness training, and completing regular audits on security posture. Using a conditional access solution is a great way to limit the access to your valuable data. You may also want to implement a Data Loss Prevention (DLP) solution to prevent data from leaking on to untrusted systems.

Want to protect your business against cybercrime? At Lutz Tech, we provide a range of smart technology solutions to help you keep things running smoothly. Feel free to contact us if you have any questions or want to learn more about our services. 

  • Achiever, Deliberative, Learner, Analytical, Responsibility

Matt Longenecker

Tech Director

Matt Longenecker, Tech Director, began his career in 2000. With over two decades of experience spanning systems administration, enterprise infrastructure, and virtualization, he brings deep technical knowledge and steady leadership to his role. Since joining Lutz in 2015, Matt has held several engineering and leadership positions that have shaped the firm’s technology initiatives. 

Leading the engineering and implementation teams at Lutz Tech, Matt oversees infrastructure, cloud, and automation projects while guiding strategic technology direction. He partners with internal stakeholders and clients to design reliable, forward-thinking solutions that enhance operations and drive efficiency. Known for his methodical approach and ability to solve complex problems, Matt enjoys improving systems and seeing measurable progress through smart, scalable technology. 

 

At Lutz, Matt is always looking to expand his knowledge—whether through hands-on experience, certifications, or staying current with emerging technologies. He enjoys digging into new tools and approaches that can improve the way the firm operates and delivers services. That mindset keeps both Matt and Lutz at the forefront of an ever-evolving tech landscape. 

402.778.7980

mlongenecker@lutz.us

Connect on LinkedIn

Recent News & Insights

Market Commentary
Is This the Time for Active Management?
We’re hearing it again: this is a stock picker’s market. That narrative tends to show up ...
Read More
Outsourced IT
Microsoft 365 Series: Understanding the Frontier Suite
Artificial intelligence is moving quickly from experimentation to everyday use. In ...
Read More
Recent News
Lutz Named a Lincoln Family-Friendly Workplace
Lutz has been recognized as a Lincoln Family-Friendly Workplace, reflecting its commitment to ...
Read More
Rural Hospital
Benefits of an Outsourced CFO for Hospitals
Hospitals across the country are reevaluating how financial leadership is structured. As ...
Read More
module-bg-desktop module-bg-mobile

Let’s get you where you want to go.

We work to simplify complexities, help make critical business decisions, and confidently focus on the things that are truly important to you. We embrace your business as our own to spark the right solutions and help you thrive.
Contact Us
Lutz-Logo-white
  • Services
    • Accounting
    • Consulting
    • Financial
    • M&A
    • Talent
    • Tech
  • About
    • Our Company
    • Our Team
    • Offices
    • Careers
    • Internships
    • Current Opportunities
  • Client Portal
    • Make a Payment
    • Accounting Client Portal
    • Financial Client Portal
    • Send Files Securely
    Submit RFP
TOLL-FREE: 866.577.0780 | © Lutz & company, PC 2026 | Privacy Policy
Follow us on LinkedIn Twitter - X Logo Follow us on Instagram Follow us on Facebook