{"id":1375042,"date":"2023-07-04T14:32:26","date_gmt":"2023-07-04T14:32:26","guid":{"rendered":"https:\/\/www.collaboris.com\/?p=1375042"},"modified":"2024-04-12T09:03:30","modified_gmt":"2024-04-12T09:03:30","slug":"cybersecurity-best-practices-incident-reporting","status":"publish","type":"post","link":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/","title":{"rendered":"Cybersecurity best practices : Incident reporting"},"content":{"rendered":"<h1>Cybersecurity best practices : Incident reporting<\/h1>\n<p><span><a href=\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2022\/08\/shutterstock_1781820470-scaled.jpg\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" alt=\"\" data-id=\"1373073\" width=\"799\" data-init-width=\"2560\" height=\"314\" data-init-height=\"1006\" title=\"Compliance,Concept,With,Businessman,Using,His,Tablet,Computer\" loading=\"lazy\" src=\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2022\/08\/shutterstock_1781820470-scaled.jpg?_t=1688481417\" data-link-wrap=\"true\" data-width=\"799\" data-height=\"314\" style=\"aspect-ratio: auto 2560 \/ 1006;\"><\/a><\/span><\/p>\n<p>The security of systems and data is of utmost importance. Every employee needs to be vigilant and proactive in identifying and reporting any suspicious activity or potential security incidents. By promptly reporting such incidents to the appropriate IT personnel or dedicated security team, potential damage can be mitigated and the overall security position improved.<\/p>\n<h2 data-block-id=\"block-4a3f3a95-53c2-4e62-ac25-5f250107abbd\" style=\"\">Why Reporting is Crucial<\/h2>\n<p>Reporting suspicious activity and security incidents plays a vital role in safeguarding against cyber threats. Here&#8217;s why it is so important to report security incidents immediately<b><\/b>:<\/p>\n<ol>\n<li><strong>Early Detection<\/strong>: Timely reporting allows the detection of security incidents at their earliest stages. This enables a swift response and can help prevent further damage or unauthorized access to systems and sensitive information.<\/li>\n<li><strong>Rapid Response<\/strong>: When incidents are reported promptly, the situation can be assessed and immediate action taken to contain and mitigate the impact. This helps minimize the potential harm caused by the incident.<\/li>\n<li><strong>Identification of Patterns<\/strong>: By reporting incidents, a collective pool of information can be accumulated that helps identify patterns and trends in cyber attacks. This knowledge helps proactively strengthen defenses and can lead to the implementation of preventive measures to thwart future attacks.<\/li>\n<li><strong>Preserving Evidence<\/strong>: Reporting incidents ensures that crucial evidence is preserved for investigation and analysis. This evidence can be invaluable in identifying the source of the attack, understanding its scope, and taking appropriate legal or disciplinary actions if necessary.<\/li>\n<li><strong>Continuous Improvement<\/strong>: Reporting incidents provides valuable feedback to IT and security teams. It can help identify vulnerabilities, gaps in defenses, and areas where additional training or security measures may be needed. This feedback loop allows security practices to be continuously improved to stay one step ahead of potential threats.<\/li>\n<\/ol>\n<p>  <span style=\"\"><img decoding=\"async\" alt=\"\" data-id=\"1375149\" width=\"196\" data-init-width=\"847\" height=\"276\" data-init-height=\"1196\" title=\"essential guide to cybersecurity ebook cropped\" loading=\"lazy\" src=\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2023\/08\/essential-guide-to-cybersecurity-ebook-cropped.png?_t=1690979525\" data-link-wrap=\"true\" data-width=\"196\" data-height=\"276\" style=\"aspect-ratio: auto 847 \/ 1196;\" ml-d=\"0\" mt-d=\"0\" center-h-d=\"true\" ml-m=\"0\" mt-m=\"0\" ml-t=\"0\" mt-t=\"0\"><\/span><\/p>\n<h3 style=\"color: rgb(52, 52, 52) !important; --tcb-applied-color:#343434 !important;\">Get your free cybersecurity best practices guide<\/h3>\n<p style=\"\">This eBook contains all 10 posts in our cybersecurity series in one handy downloadable guide so you can read it at your leisure.<\/p>\n<p>__CONFIG_colors_palette__{&#8220;active_palette&#8221;:0,&#8221;config&#8221;:{&#8220;colors&#8221;:{&#8220;8eb49&#8221;:{&#8220;name&#8221;:&#8221;Main Accent&#8221;,&#8221;parent&#8221;:-1}},&#8221;gradients&#8221;:[]},&#8221;palettes&#8221;:[{&#8220;name&#8221;:&#8221;Default Palette&#8221;,&#8221;value&#8221;:{&#8220;colors&#8221;:{&#8220;8eb49&#8221;:{&#8220;val&#8221;:&#8221;rgb(0, 47, 64)&#8221;}},&#8221;gradients&#8221;:[]},&#8221;original&#8221;:{&#8220;colors&#8221;:{&#8220;8eb49&#8221;:{&#8220;val&#8221;:&#8221;rgb(19, 114, 211)&#8221;,&#8221;hsl&#8221;:{&#8220;h&#8221;:210,&#8221;s&#8221;:0.83,&#8221;l&#8221;:0.45,&#8221;a&#8221;:1}}},&#8221;gradients&#8221;:[]}}]}__CONFIG_colors_palette__ <a href=\"https:\/\/www.collaboris.com\/cybersecurity-guide\/\" target=\"_blank\" rel=\"noopener\"><span style=\"\">    <\/span> <span style=\"\"><span data-tcb_hover_state_parent=\"\" style=\"\">Get y<span style=\"background-color: transparent;\"><\/span>our free eBook<\/span><\/span> <\/a>  <\/p>\n<h2 style=\"\">Consequences of failing to report incidents<\/h2>\n<p>Failing to report security incidents can have serious consequences for individuals, organizations, and society as a whole. In this article, we will explore the problems that arise when security incidents are not reported promptly and effectively.<\/p>\n<ol>\n<li><strong>Escalation of the Incident.&nbsp;<\/strong>When security incidents go unreported, they have the potential to escalate into much larger and more damaging events. By failing to report an incident, the opportunity to address and mitigate the issue in its early stages is lost. This can result in increased damage, compromised systems, and prolonged recovery times.<\/li>\n<li><strong>Lack of Awareness and Preparedness&nbsp;<\/strong>Reporting security incidents plays a crucial role in raising awareness about potential threats and vulnerabilities. When incidents are not reported, there is a lack of information sharing within the organization and the wider community. This hampers efforts to identify patterns, develop preventive measures, and enhance overall preparedness against future attacks.<\/li>\n<li><strong>Legal and Regulatory Compliance&nbsp;<\/strong>Many industries and jurisdictions have legal and regulatory requirements mandating the reporting of security incidents. Failure to comply with these obligations can lead to severe penalties, including fines, legal action, and reputational damage. Organizations must understand their responsibilities and ensure that incidents are promptly reported to the appropriate authorities.<\/li>\n<li><strong>Loss of Trust and Reputation&nbsp;<\/strong>Failing to report security incidents can erode trust among stakeholders, including customers, partners, and investors. When incidents are not disclosed, it raises questions about an organization&#8217;s transparency and commitment to protecting sensitive information. This loss of trust can have long-lasting effects on an organization&#8217;s reputation and can result in financial losses and a decline in business opportunities.<\/li>\n<li><strong>Missed Learning Opportunities&nbsp;<\/strong>Reporting security incidents provides valuable learning opportunities for organizations. By analyzing and understanding the root causes of incidents, organizations can implement corrective measures to prevent similar incidents from occurring in the future. When incidents go unreported, these learning opportunities are missed, and the organization remains vulnerable to recurring threats.<\/li>\n<\/ol>\n<h2 style=\"\">Other posts in this series:<\/h2>\n<p><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/essential-cybersecurity-guide\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Introduction to cyber security<\/a><\/p>\n<ol>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-password-management\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Password management<\/a><\/li>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-malware\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Malware<\/a><\/li>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Social engineering<\/a><\/li>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Phishing scams<\/a><\/li>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Social media security<\/a><\/li>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-wifi-network-security\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Wi-Fi and network security<\/a><\/li>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-mobile-device-security\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Mobile device security<\/a><\/li>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Data protection and backup<\/a><\/li>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Safe web browsing<\/a><\/li>\n<li>Incident reporting (this post)<\/li>\n<\/ol>\n<h2 style=\"\">You may also like:<\/h2>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">April 8, 2024 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/best-practices-policy-change-management-sharepoint\/&quot;,&quot;title&quot;:&quot;Best Practices for Policy Change Management in SharePoint&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/best-practices-policy-change-management-sharepoint\/\" title=\"Best Practices for Policy Change Management in SharePoint\" data-css=\"\">Best Practices for Policy Change Management in SharePoint<\/a><\/span><\/h2>\n<p>Best Practices for Policy Change Management in SharePoint Managing policy documents efficiently is crucial <a href=\"https:\/\/www.collaboris.com\/best-practices-policy-change-management-sharepoint\/#more-1377489\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/best-practices-policy-change-management-sharepoint\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">February 12, 2024 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/best-practices-policy-change-management-sharepoint\/&quot;,&quot;title&quot;:&quot;Best Practices for Policy Change Management in SharePoint&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/importance-of-employee-knowledge-management\/\" title=\"The Importance of Employee Knowledge Management\" data-css=\"\">The Importance of Employee Knowledge Management<\/a><\/span><\/h2>\n<p>The Importance of Employee Knowledge Management In today&#8217;s fast-paced business environment, knowledge is a <a href=\"https:\/\/www.collaboris.com\/importance-of-employee-knowledge-management\/#more-1376444\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/importance-of-employee-knowledge-management\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">January 30, 2024 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/best-practices-policy-change-management-sharepoint\/&quot;,&quot;title&quot;:&quot;Best Practices for Policy Change Management in SharePoint&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/leveraging-ai-policy-success\/\" title=\"Leveraging AI for Policy Writing Success\" data-css=\"\">Leveraging AI for Policy Writing Success<\/a><\/span><\/h2>\n<p>Leveraging AI for Policy Writing SuccessIn the realm of policy writing, data and documentation <a href=\"https:\/\/www.collaboris.com\/leveraging-ai-policy-success\/#more-1376261\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/leveraging-ai-policy-success\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">January 16, 2024 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/best-practices-policy-change-management-sharepoint\/&quot;,&quot;title&quot;:&quot;Best Practices for Policy Change Management in SharePoint&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/essential-tips-policy-management\/\" title=\"Essential Tips for Effective Policy Management\" data-css=\"\">Essential Tips for Effective Policy Management<\/a><\/span><\/h2>\n<p>10 Essential Tips for Effective Policy Management: A Comprehensive Guide In today&#8217;s fast-paced business <a href=\"https:\/\/www.collaboris.com\/essential-tips-policy-management\/#more-1376151\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/essential-tips-policy-management\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">December 12, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/best-practices-policy-change-management-sharepoint\/&quot;,&quot;title&quot;:&quot;Best Practices for Policy Change Management in SharePoint&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/why-ai-chat-tool-usage-policy\/\" title=\"Why you need a AI Chat Tool Usage Policy in Your Organization\" data-css=\"\">Why you need a AI Chat Tool Usage Policy in Your Organization<\/a><\/span><\/h2>\n<p>The urgency of establishing an AI usage policy In the ever-evolving landscape of business <a href=\"https:\/\/www.collaboris.com\/why-ai-chat-tool-usage-policy\/#more-1375857\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/why-ai-chat-tool-usage-policy\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">November 15, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/best-practices-policy-change-management-sharepoint\/&quot;,&quot;title&quot;:&quot;Best Practices for Policy Change Management in SharePoint&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/maximizing-internal-communications\/\" title=\"Maximizing internal communications\" data-css=\"\">Maximizing internal communications<\/a><\/span><\/h2>\n<p>Maximizing internal communicationsIn the modern business landscape, effective internal communication is the cornerstone of <a href=\"https:\/\/www.collaboris.com\/maximizing-internal-communications\/#more-1375724\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/maximizing-internal-communications\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity best practices : Incident reporting The security of systems and data is of utmost importance. Every employee needs to be vigilant and proactive in identifying and reporting any suspicious activity or potential security incidents. By promptly reporting such incidents to the appropriate IT personnel or dedicated security team, potential damage can be mitigated and [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":2109,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"categories":[6],"tags":[],"class_list":["post-1375042","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-policy-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity best practices : Incident reporting<\/title>\n<meta name=\"description\" content=\"Every employee needs to be vigilant and proactive in identifying and reporting any suspicious activity or potential security incidents.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity best practices : Incident reporting\" \/>\n<meta property=\"og:description\" content=\"The security of systems and data is of utmost importance. Every employee needs to be vigilant and proactive in identifying and reporting any suspicious activity or potential security incidents. By promptly reporting such incidents to the appropriate IT personnel or dedicated security team, potential damage can be mitigated and the overall security position improved.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/\" \/>\n<meta property=\"og:site_name\" content=\"Collaboris\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Collaboris\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-04T14:32:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-12T09:03:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2022\/08\/shutterstock_1781820470-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1006\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Helen Jones\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@helen.jones@collaboris.co.uk\" \/>\n<meta name=\"twitter:site\" content=\"@Collaboris\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Helen Jones\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/\"},\"author\":{\"name\":\"Helen Jones\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef\"},\"headline\":\"Cybersecurity best practices : Incident reporting\",\"datePublished\":\"2023-07-04T14:32:26+00:00\",\"dateModified\":\"2024-04-12T09:03:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/\"},\"wordCount\":871,\"publisher\":{\"@id\":\"https:\/\/www.collaboris.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"articleSection\":[\"Policy Management\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/\",\"url\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/\",\"name\":\"Cybersecurity best practices : Incident reporting\",\"isPartOf\":{\"@id\":\"https:\/\/www.collaboris.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"datePublished\":\"2023-07-04T14:32:26+00:00\",\"dateModified\":\"2024-04-12T09:03:30+00:00\",\"description\":\"Every employee needs to be vigilant and proactive in identifying and reporting any suspicious activity or potential security incidents.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/#primaryimage\",\"url\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"contentUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"width\":820,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.collaboris.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity best practices : Incident reporting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.collaboris.com\/#website\",\"url\":\"https:\/\/www.collaboris.com\/\",\"name\":\"Collaboris\",\"description\":\"We make compliance simple\",\"publisher\":{\"@id\":\"https:\/\/www.collaboris.com\/#organization\"},\"alternateName\":\"DocRead\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.collaboris.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.collaboris.com\/#organization\",\"name\":\"Collaboris\",\"alternateName\":\"DocRead\",\"url\":\"https:\/\/www.collaboris.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png\",\"contentUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png\",\"width\":150,\"height\":40,\"caption\":\"Collaboris\"},\"image\":{\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Collaboris\/\",\"https:\/\/x.com\/Collaboris\",\"https:\/\/www.linkedin.com\/company\/collaboris\"],\"description\":\"Collaboris is a Software company that created a policy management tool called DocRead.\",\"email\":\"info@collaboris.com\",\"telephone\":\"02079935140\",\"legalName\":\"Collaboris Ltd\",\"foundingDate\":\"2007-12-03\",\"vatID\":\"GB928895360\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1\",\"maxValue\":\"10\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef\",\"name\":\"Helen Jones\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g\",\"caption\":\"Helen Jones\"},\"sameAs\":[\"https:\/\/x.com\/helen.jones@collaboris.co.uk\"],\"url\":\"https:\/\/www.collaboris.com\/author\/helen-jones\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity best practices : Incident reporting","description":"Every employee needs to be vigilant and proactive in identifying and reporting any suspicious activity or potential security incidents.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/","og_locale":"en_GB","og_type":"article","og_title":"Cybersecurity best practices : Incident reporting","og_description":"The security of systems and data is of utmost importance. Every employee needs to be vigilant and proactive in identifying and reporting any suspicious activity or potential security incidents. By promptly reporting such incidents to the appropriate IT personnel or dedicated security team, potential damage can be mitigated and the overall security position improved.","og_url":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/","og_site_name":"Collaboris","article_publisher":"https:\/\/www.facebook.com\/Collaboris\/","article_published_time":"2023-07-04T14:32:26+00:00","article_modified_time":"2024-04-12T09:03:30+00:00","og_image":[{"width":2560,"height":1006,"url":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2022\/08\/shutterstock_1781820470-scaled.jpg","type":"image\/jpeg"}],"author":"Helen Jones","twitter_card":"summary_large_image","twitter_creator":"@helen.jones@collaboris.co.uk","twitter_site":"@Collaboris","twitter_misc":{"Written by":"Helen Jones","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/#article","isPartOf":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/"},"author":{"name":"Helen Jones","@id":"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef"},"headline":"Cybersecurity best practices : Incident reporting","datePublished":"2023-07-04T14:32:26+00:00","dateModified":"2024-04-12T09:03:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/"},"wordCount":871,"publisher":{"@id":"https:\/\/www.collaboris.com\/#organization"},"image":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","articleSection":["Policy Management"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/","url":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/","name":"Cybersecurity best practices : Incident reporting","isPartOf":{"@id":"https:\/\/www.collaboris.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/#primaryimage"},"image":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","datePublished":"2023-07-04T14:32:26+00:00","dateModified":"2024-04-12T09:03:30+00:00","description":"Every employee needs to be vigilant and proactive in identifying and reporting any suspicious activity or potential security incidents.","breadcrumb":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/#primaryimage","url":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","contentUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","width":820,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.collaboris.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity best practices : Incident reporting"}]},{"@type":"WebSite","@id":"https:\/\/www.collaboris.com\/#website","url":"https:\/\/www.collaboris.com\/","name":"Collaboris","description":"We make compliance simple","publisher":{"@id":"https:\/\/www.collaboris.com\/#organization"},"alternateName":"DocRead","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.collaboris.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.collaboris.com\/#organization","name":"Collaboris","alternateName":"DocRead","url":"https:\/\/www.collaboris.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png","contentUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png","width":150,"height":40,"caption":"Collaboris"},"image":{"@id":"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Collaboris\/","https:\/\/x.com\/Collaboris","https:\/\/www.linkedin.com\/company\/collaboris"],"description":"Collaboris is a Software company that created a policy management tool called DocRead.","email":"info@collaboris.com","telephone":"02079935140","legalName":"Collaboris Ltd","foundingDate":"2007-12-03","vatID":"GB928895360","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1","maxValue":"10"}},{"@type":"Person","@id":"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef","name":"Helen Jones","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.collaboris.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g","caption":"Helen Jones"},"sameAs":["https:\/\/x.com\/helen.jones@collaboris.co.uk"],"url":"https:\/\/www.collaboris.com\/author\/helen-jones\/"}]}},"modified_by":"Helen Jones","_links":{"self":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts\/1375042","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/comments?post=1375042"}],"version-history":[{"count":13,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts\/1375042\/revisions"}],"predecessor-version":[{"id":1377623,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts\/1375042\/revisions\/1377623"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/media\/2109"}],"wp:attachment":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/media?parent=1375042"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/categories?post=1375042"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/tags?post=1375042"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}