Post-attack planning.
5. Develop a plan for reporting security incidents to clients.
It’s probably one of the most difficult tasks among those required post-cyberattack, and preparing a plan for reporting to clients a breach of their data will make the process move much more smoothly.