Cyber Liability 101: What To Do When There Is A Cyber Attack (Exact Steps To Take)

Bryan Gutowsky • June 8, 2024

Cyber Liability 101: What To Do When There Is A Cyber Attack (Exact Steps To Take)

If your business experiences a cyber attack, every second counts. Acting quickly and correctly can make the difference between a manageable incident and a financial or reputational disaster.


In this article, we’ll walk you through the exact steps to take after a cyber attack—especially if you carry cyber liability insurance.


Step 1: Contact Breach Counsel Immediately

The first call you make after discovering a breach should be to a breach response attorney (also called breach counsel or breach coach). If your business has cyber liability insurance, your insurance carrier may provide access to these professionals as part of your policy.


🔑 Why this matters: Reporting requirements are strict—some insurers or state regulations require notice within 12 to 24 hours of discovering the breach. Delay can void coverage or trigger penalties.


Breach counsel acts as your incident response quarterback, guiding you through the legal and technical maze that follows a cyber event.


Step 2: Notify Your Cyber Insurance Carrier

Most carriers have pre-approved law firms, forensics teams, and vendors. It's essential to follow the insurance company’s approved process to ensure costs are covered and deadlines are met. If the breach occurs after business hours or on a weekend, initiate the claims process immediately—response teams are often available 24/7.


Step 3: Begin IT Forensics and Investigation

Once breach counsel is engaged, they will assign an incident response team to conduct a forensic analysis of the breach under attorney-client privilege. This investigation identifies:

  • How the breach happened
  • Whether the threat still exists
  • What systems and data were compromised


The forensic team works to contain the breach and get your systems operational again.


Step 4: Follow Proper Ransomware Response Protocols

If the attack involves ransomware, do not attempt to negotiate with cybercriminals on your own. Breach counsel will help determine if a ransom can be legally paid and will guide you through Office of Foreign Assets Control (OFAC) compliance if applicable.


Step 5: Comply with Notification Laws

Based on the forensic findings, breach counsel will advise whether client notification is required. They will:

  • Draft notification letters
  • Coordinate identity monitoring or credit protection services
  • Ensure compliance with state-specific notification laws, especially if affected clients reside in multiple states


Failing to follow these requirements can result in fines, lawsuits, or additional regulatory action.


Why Timing and Expertise Matter

Cyber attacks can escalate fast. From legal exposure and regulatory fines to reputational damage, the risks are significant. A delay or misstep in response can turn a manageable situation into a business-crippling event.


That’s why working with breach response professionals—from the first hour of discovery—is critical.


Final Thoughts: Be Proactive, Not Reactive

Having a cyber liability insurance policy that includes breach response support is one of the best safeguards a business can have. But even the best insurance won’t help if you don’t act fast and follow proper steps.


If you're unsure whether your current policy includes these protections—or if you need help putting the right coverage in place—contact us today.

We’ll help you review your coverage and make sure you're protected.


Additional Resources:

Contact Us

Does Auto Insurance Provide Coverage While You Are Out Of State?
By Bryan Gutowsky August 14, 2024
Wondering if your Michigan auto insurance covers you when driving out of state? Learn how your coverage works across state lines and what protections stay in place.
By Bryan Gutowsky June 29, 2025
How Fast Will a Cyber Insurance Policy Respond After an Incident?
Tech E&O Insurance: Common Exclusions & Coverage Considerations
By Bryan Gutowsky August 12, 2024
Learn what Tech Errors & Omissions (E&O) insurance does not cover, including fraud, bodily injury, product liability, and more. Understand exclusions, policy limits, and how to better protect your tech business.
Can Business Owners Be Held Personally Liable for a Data Breach?
By Bryan Gutowsky August 11, 2024
Can business owners and executives be held personally liable for a data breach? Learn how negligence, compliance failures, and lack of insurance can put your personal assets at risk—and how to protect yourself with the right coverage.
What Is Gap Insurance in Michigan? Do You Need It? Is It Required?
By Bryan Gutowsky August 8, 2024
Wondering what gap insurance is and whether you need it in Michigan? Learn how gap insurance works, when it makes sense, and if it’s required by law.
MI Workers Comp: Do You Need Coverage for Independent Contractors?
By Bryan Gutowsky August 7, 2024
Do Michigan businesses need workers compensation for independent contractors? Learn the rules, exceptions, and best practices to stay compliant and protect your company.
Does Cyber Insurance Cover Social Engineering?
By Bryan Gutowsky August 1, 2024
Learn what social engineering is and whether your cyber liability insurance policy covers it. Discover key protections Michigan businesses need to avoid financial loss.
Michigan Homeowners Insurance: What Factors Impact Your Premium?
By Bryan Gutowsky July 31, 2024
Learn what factors impact your Michigan homeowners insurance premium—including location, home age, and insurance score—and discover practical ways to lower your costs.
Michigan Auto Insurance - Commercial vs Personal
By Bryan Gutowsky July 28, 2024
Learn the key differences between commercial and personal auto insurance in Michigan. Understand when you need each type, what they cover, and how to avoid costly coverage gaps.
What Is Malware? And Does Cyber Insurance Cover It?
By Bryan Gutowsky July 25, 2024
Learn what malware is, how it can impact your business, and whether cyber liability insurance covers the damages. Discover the key protections every cyber policy should include.
Show More