Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Login
  • Contact Us
  • Home
  • Service Level Agreement

Steps to Follow in Case of a Suspected Breach

Written by Juliano Santos

Updated at October 23rd, 2024

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Payment Portal
  • Service Level Agreement
  • MemberDesk
    How to get started with MemberDesk Membership Management Event Management Reporting Course Management
  • Wildix
  • Keeper
  • Microsoft 365
+ More

Table of Contents

PROCEDURE

PURPOSE

Establish a clear and effective response procedure in the event of a suspected or confirmed breach. This ensures the protection of sensitive information, and minimizes the impact of the breach.

 
 

SCOPE

This article applies to all employees, contractors, and third-party service providers who have access to the organization's systems, networks, or data. It covers all types of data breaches, including but not limited to unauthorized data access, data theft, and accidental disclosure of confidential information.

 
 

RESPONSIBILITIES

Employees: 
   - Immediately report any suspected data breach to ALPHA at 778-441-2535.
   - Follow the breach response procedures as outlined in this document.

ALPHA:
   - Conduct initial investigations into suspected breaches to assess the scope and impact.
   - Implement possible measures to contain and mitigate the breach.

 
 

DEFINITIONS

  • Breach: A security incident where information is accessed without authorization.
     
  • Sensitive Information: Data that, if disclosed, could result in harm to the organization or individuals, including personal identification numbers, financial data, or proprietary business information.
     
  • Two-Factor Authentication (2FA): An additional layer of security requiring not only a password and username but also something that only the user has on them, i.e., a piece of information only they should know or have immediately to hand.
     
  • Cybersecurity Professional: An expert who specializes in protecting systems, networks, and programs from digital attacks.
 
 

PROCEDURE

If you suspect that your personal or company data has been compromised, it is crucial to take immediate action to secure your information and notify ALPHA. Please follow the steps outlined below:

Step 1: Asses the Situation
Responsibilities: Customer

  • Document any unusual activities or signs that led you to suspect a breach, such as unfamiliar account transactions, login attempts, or unauthorized access notifications.

 

Step 2: Immediate Actions
Responsibilities: Customer

  • Disconnect any affected devices from the internet to prevent further unauthorized access or data transmission.
  • Avoid using compromised accounts or devices until they have been secured.

 

Step 3: Contact ALPHA
Responsibilities: Customer

  • Immediately contact ALPHA via the main phone line at 778-441-2535 to report the suspected breach.
  • Provide them with as much information as possible regarding the incident, including the time, date, and nature of the suspicious activity.

 

Step 4: Follow ALPHA's Guidance
Responsibilities: Customer

  • Follow any instructions or recommendations provided by ALPHA to help secure your accounts and devices. These might include:
    • Change Passwords
    • Enable Two-Factor Authentication (if available)
  • Provide any additional information or documentation they might request to assist in their investigation.

 

By following these steps, you can help mitigate the impact of a breach and protect your sensitive information. Remember, swift action is critical in preventing further damage.

guide template

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • Teams Support App
  • Basic Troubleshooting Before Calling ALPHA IT
  • Getting the Best Support from ALPHA IT
  • SLA - Onsite Required IT Interventions

Copyright 2025 – ALPHA.

Knowledge Base Software powered by Helpjuice

Expand