﻿{"id":2724,"date":"2015-10-27T21:53:04","date_gmt":"2015-10-27T21:53:04","guid":{"rendered":"http:\/\/www.5wpr.com\/new\/?p=2724"},"modified":"2022-04-26T19:04:41","modified_gmt":"2022-04-26T19:04:41","slug":"data-breach-public-relations","status":"publish","type":"post","link":"https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/","title":{"rendered":"4 Ways To Ensure Being Hacked Doesn\u2019t Turn Into A PR Nightmare"},"content":{"rendered":"<p>With an estimated 10 million cyber attacks a day, the question isn\u2019t if a company will get hacked, it&#8217;s about how to handle it when it does. As was seen with Target\u2019s own security breach, a poorly handled reaction can result in trust being lost in the company, and both stock and sales will plummet.<\/p>\n<p>Businesses need to be prepared for these eventualities, because a fast response can do a lot for damage control &#8211; whereas scrambling for a plan can cause the public to lose faith that a business can be trusted with their data.<\/p>\n<p>Below are 4 ways to ensure being hacked doesn\u2019t turn into a PR nightmare. There are more, but these are definitely at the top of the list of how to best manage cyber-breach PR:<\/p>\n<h2>Respond Quickly And Honestly<\/h2>\n<p>In the best of times, people can be cynical, and when reading about how a company they\u2019ve given their money to might be the reason their identity gets stolen, they have a big stake in being cynical. Given the serious nature of identity theft, it is imperative that a business demonstrates that they take their customer\u2019s very real concerns seriously.<\/p>\n<p>So be prepared for sincere apologies of course, but also communicate a plan of action that customers and shareholders alike can count on. An apology that comes hand-in-hand with a solution is more than the lip-service that cynical clients might expect.<\/p>\n<h2>Create A Public Pathway For Communication For Those Affected<\/h2>\n<p>As with all PR, engagement is critical. It is also important to get as much negativity off of a company\u2019s main sites as possible, which is a great reason to create new properties that are specific to the process that clients can be guided to. Having a single site where detailed information is provided, questions can be answered, and solutions can be organized through builds confidence in the company.<\/p>\n<p>Even more importantly, it provides a link away from a company\u2019s other properties, allowing for simple replies that don\u2019t clog up a company\u2019s social media feed with complaints and worries. What happens online, stays online, and redirecting the understandably negative feedback elsewhere not only helps to manage the current situation, it also makes future PR efforts simple to deal with.<\/p>\n<h2>Make Sure Communication Is Clear And Concise<\/h2>\n<p>When a company\u2019s credibility is on the line, it is imperative that all communication is simple to understand. This means explaining things in a way that is so simple, that it is impossible to come to a different conclusion. The last thing any business needs in a crisis is more questions &#8211; and if what is being explained can\u2019t be understood by a third grader, there will be more questions. The public wants simple solutions and explanations that can fit in a Twitter post. Oblige them.<\/p>\n<h2>Offer Information<\/h2>\n<p>When a cyber attack occurs, customers are not wrong to feel a breach of trust in the business that was hacked. While it may be personal for the business, it&#8217;s extremely personal for the people whose data might be in the hands of criminals. Loyalty and trust can\u2019t be bought, but even in today\u2019s digital age, actions speak louder than words. Offer free credit monitoring, discounts, gift-cards &#8211; something to compensate clients for a failure in the business\u2019s security.<\/p>\n<p>Not only is it the cost of doing business, it demonstrates in a tangible way how much their business is valued.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With an estimated 10 million cyber attacks a day, the question isn\u2019t if a company will get hacked, it&#8217;s about how to handle it when it does. As was seen &#8230;<\/p>\n","protected":false},"author":13,"featured_media":2747,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[131],"tags":[113,276,133],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Databreach PR: Data Communications Agency: Crisis PR firm<\/title>\r\n<meta name=\"description\" content=\"With an estimated 10 million cyber attacks a day, the question isn\u2019t if a company will get hacked, it&#039;s about how to handle it when it does. As was seen\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Databreach PR: Data Communications Agency: Crisis PR firm\" \/>\r\n<meta property=\"og:description\" content=\"With an estimated 10 million cyber attacks a day, the question isn\u2019t if a company will get hacked, it&#039;s about how to handle it when it does. As was seen\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Public Relations Blog | 5W PR Agency | PR Firm\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/5WPublicRelations\" \/>\r\n<meta property=\"article:published_time\" content=\"2015-10-27T21:53:04+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2022-04-26T19:04:41+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/www.5wpr.com\/new\/wp-content\/uploads\/2015\/10\/Data-Breach-Public-Relations.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1020\" \/>\r\n\t<meta property=\"og:image:height\" content=\"531\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"author\" content=\"Cary Leibowitz\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cary Leibowitz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/\"},\"author\":{\"name\":\"Cary Leibowitz\",\"@id\":\"https:\/\/www.5wpr.com\/new\/#\/schema\/person\/38ee96fd443c64f8683c157b191ff6ba\"},\"headline\":\"4 Ways To Ensure Being Hacked Doesn\u2019t Turn Into A PR Nightmare\",\"datePublished\":\"2015-10-27T21:53:04+00:00\",\"dateModified\":\"2022-04-26T19:04:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/\"},\"wordCount\":594,\"publisher\":{\"@id\":\"https:\/\/www.5wpr.com\/new\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.5wpr.com\/new\/wp-content\/uploads\/2015\/10\/Data-Breach-Public-Relations.jpg\",\"keywords\":[\"crisis communications\",\"Public Relations\",\"strategy\"],\"articleSection\":[\"Crisis PR\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/\",\"url\":\"https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/\",\"name\":\"Databreach PR: Data Communications Agency: Crisis PR firm\",\"isPartOf\":{\"@id\":\"https:\/\/www.5wpr.com\/new\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.5wpr.com\/new\/wp-content\/uploads\/2015\/10\/Data-Breach-Public-Relations.jpg\",\"datePublished\":\"2015-10-27T21:53:04+00:00\",\"dateModified\":\"2022-04-26T19:04:41+00:00\",\"description\":\"With an estimated 10 million cyber attacks a day, the question isn\u2019t if a company will get hacked, it's about how to handle it when it does. As was seen\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/#primaryimage\",\"url\":\"https:\/\/www.5wpr.com\/new\/wp-content\/uploads\/2015\/10\/Data-Breach-Public-Relations.jpg\",\"contentUrl\":\"https:\/\/www.5wpr.com\/new\/wp-content\/uploads\/2015\/10\/Data-Breach-Public-Relations.jpg\",\"width\":1020,\"height\":531,\"caption\":\"Data Breach Public Relations\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.5wpr.com\/new\/#website\",\"url\":\"https:\/\/www.5wpr.com\/new\/\",\"name\":\"Public Relations Blog | 5W PR Agency | PR Firm\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.5wpr.com\/new\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.5wpr.com\/new\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.5wpr.com\/new\/#organization\",\"name\":\"5W Public Relations Firm\",\"url\":\"https:\/\/www.5wpr.com\/new\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.5wpr.com\/new\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.5wpr.com\/new\/wp-content\/uploads\/2014\/08\/5W-logo.jpg\",\"contentUrl\":\"https:\/\/www.5wpr.com\/new\/wp-content\/uploads\/2014\/08\/5W-logo.jpg\",\"width\":160,\"height\":96,\"caption\":\"5W Public Relations Firm\"},\"image\":{\"@id\":\"https:\/\/www.5wpr.com\/new\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/5WPublicRelations\",\"https:\/\/x.com\/5w_pr\",\"https:\/\/instagram.com\/5wpr\/\",\"https:\/\/www.linkedin.com\/company\/5w-public-relations\",\"https:\/\/www.pinterest.com\/5wpr\/\",\"https:\/\/www.youtube.com\/user\/5WPRSpeakers\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.5wpr.com\/new\/#\/schema\/person\/38ee96fd443c64f8683c157b191ff6ba\",\"name\":\"Cary Leibowitz\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Databreach PR: Data Communications Agency: Crisis PR firm","description":"With an estimated 10 million cyber attacks a day, the question isn\u2019t if a company will get hacked, it's about how to handle it when it does. As was seen","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/","og_locale":"en_US","og_type":"article","og_title":"Databreach PR: Data Communications Agency: Crisis PR firm","og_description":"With an estimated 10 million cyber attacks a day, the question isn\u2019t if a company will get hacked, it's about how to handle it when it does. As was seen","og_url":"https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/","og_site_name":"Public Relations Blog | 5W PR Agency | PR Firm","article_publisher":"https:\/\/www.facebook.com\/5WPublicRelations","article_published_time":"2015-10-27T21:53:04+00:00","article_modified_time":"2022-04-26T19:04:41+00:00","og_image":[{"width":1020,"height":531,"url":"https:\/\/www.5wpr.com\/new\/wp-content\/uploads\/2015\/10\/Data-Breach-Public-Relations.jpg","type":"image\/jpeg"}],"author":"Cary Leibowitz","twitter_misc":{"Written by":"Cary Leibowitz","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/#article","isPartOf":{"@id":"https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/"},"author":{"name":"Cary Leibowitz","@id":"https:\/\/www.5wpr.com\/new\/#\/schema\/person\/38ee96fd443c64f8683c157b191ff6ba"},"headline":"4 Ways To Ensure Being Hacked Doesn\u2019t Turn Into A PR Nightmare","datePublished":"2015-10-27T21:53:04+00:00","dateModified":"2022-04-26T19:04:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/"},"wordCount":594,"publisher":{"@id":"https:\/\/www.5wpr.com\/new\/#organization"},"image":{"@id":"https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.5wpr.com\/new\/wp-content\/uploads\/2015\/10\/Data-Breach-Public-Relations.jpg","keywords":["crisis communications","Public Relations","strategy"],"articleSection":["Crisis PR"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/","url":"https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/","name":"Databreach PR: Data Communications Agency: Crisis PR firm","isPartOf":{"@id":"https:\/\/www.5wpr.com\/new\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/#primaryimage"},"image":{"@id":"https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.5wpr.com\/new\/wp-content\/uploads\/2015\/10\/Data-Breach-Public-Relations.jpg","datePublished":"2015-10-27T21:53:04+00:00","dateModified":"2022-04-26T19:04:41+00:00","description":"With an estimated 10 million cyber attacks a day, the question isn\u2019t if a company will get hacked, it's about how to handle it when it does. As was seen","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.5wpr.com\/new\/data-breach-public-relations\/#primaryimage","url":"https:\/\/www.5wpr.com\/new\/wp-content\/uploads\/2015\/10\/Data-Breach-Public-Relations.jpg","contentUrl":"https:\/\/www.5wpr.com\/new\/wp-content\/uploads\/2015\/10\/Data-Breach-Public-Relations.jpg","width":1020,"height":531,"caption":"Data Breach Public Relations"},{"@type":"WebSite","@id":"https:\/\/www.5wpr.com\/new\/#website","url":"https:\/\/www.5wpr.com\/new\/","name":"Public Relations Blog | 5W PR Agency | PR Firm","description":"","publisher":{"@id":"https:\/\/www.5wpr.com\/new\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.5wpr.com\/new\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.5wpr.com\/new\/#organization","name":"5W Public Relations Firm","url":"https:\/\/www.5wpr.com\/new\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.5wpr.com\/new\/#\/schema\/logo\/image\/","url":"https:\/\/www.5wpr.com\/new\/wp-content\/uploads\/2014\/08\/5W-logo.jpg","contentUrl":"https:\/\/www.5wpr.com\/new\/wp-content\/uploads\/2014\/08\/5W-logo.jpg","width":160,"height":96,"caption":"5W Public Relations Firm"},"image":{"@id":"https:\/\/www.5wpr.com\/new\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/5WPublicRelations","https:\/\/x.com\/5w_pr","https:\/\/instagram.com\/5wpr\/","https:\/\/www.linkedin.com\/company\/5w-public-relations","https:\/\/www.pinterest.com\/5wpr\/","https:\/\/www.youtube.com\/user\/5WPRSpeakers"]},{"@type":"Person","@id":"https:\/\/www.5wpr.com\/new\/#\/schema\/person\/38ee96fd443c64f8683c157b191ff6ba","name":"Cary Leibowitz"}]}},"_links":{"self":[{"href":"https:\/\/www.5wpr.com\/new\/wp-json\/wp\/v2\/posts\/2724"}],"collection":[{"href":"https:\/\/www.5wpr.com\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.5wpr.com\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.5wpr.com\/new\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.5wpr.com\/new\/wp-json\/wp\/v2\/comments?post=2724"}],"version-history":[{"count":0,"href":"https:\/\/www.5wpr.com\/new\/wp-json\/wp\/v2\/posts\/2724\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.5wpr.com\/new\/wp-json\/wp\/v2\/media\/2747"}],"wp:attachment":[{"href":"https:\/\/www.5wpr.com\/new\/wp-json\/wp\/v2\/media?parent=2724"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.5wpr.com\/new\/wp-json\/wp\/v2\/categories?post=2724"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.5wpr.com\/new\/wp-json\/wp\/v2\/tags?post=2724"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}