What to Do in Case of Data Breach: 72-Hour Crisis Management
The 72-hour period that starts ticking from the moment a data breach is detected is the most critical time period determining your company's future. Here's a step-by-step Crisis Response Plan.

Taha Kocal
Backend Engineer

In the 2026 world where cyber attacks have become sophisticated and insider threats have increased, the "It won't happen to us" approach has lost its validity. The question is no longer "Will a breach occur?" but "How will we respond when a breach occurs?"
Panic, lack of planning, and late notification cause heavier administrative fines and reputation damage than the breach itself.
1. Detection and Immediate Response (0-12 Hours)
The moment breach news arrives (a cyber attack alarm, an exposed database, or a stolen company computer), the first goal is to stop the bleeding.
- Assemble the Breach Response Team: The core team consisting of IT, Legal, HR, and Corporate Communications departments must immediately convene
- Isolate the Breach: If the attack is ongoing, technical measures such as disconnecting systems from the network, freezing accounts, or resetting permissions should be taken
- Preserve Evidence: Log records and system images should be preserved intact for forensic investigation. These records will be your most important defense tool in Board investigations
2. Risk Assessment and Analysis (12-24 Hours)
Not every security incident is a "Data Breach" that needs to be reported under KVKK. At this stage, legal and technical teams should seek answers to these questions:
- What Data Was Affected? (Identity, contact, financial data, or special category data?)
- What is the Number of People? How many people were affected by the breach, and to what extent?
- What is the Risk Level? What are the adverse consequences that affected individuals might face (identity theft, reputation damage, financial loss)?
Critical Note: When examining 2026 Board decisions; even if the effects of the breach are low, fines were issued for "violation of notification obligation" in cases where this determination could not be based on concrete justification.
3. Notification to Board and Data Subjects (24-72 Hours)
According to the law, notification must be made to the Personal Data Protection Authority within 72 hours at the latest from the detection of the breach.
- Board Notification: Made through KVKK's online breach notification module. If all information cannot be gathered within 72 hours, the "Phased Notification" mechanism should be activated and a justified reason for the delay should be provided
- Data Subject Notification: If the breach creates high risk to individuals' rights and freedoms, data owners ("Customers, Employees, etc.") should also be notified in the shortest reasonable time, in clear and plain language
Warning: Trying to "cover up" the incident without informing data subjects is the most costly mistake companies make in 2026.
4. Documentation and "Accountability"
Even if no notification is made to the Board (in cases of very low risk), the reasons for the decision why the breach was not reported must be recorded in writing.
Even the smallest cyber incident occurring in your company; when it happened, how it was managed, and what its results were should be kept in a "Data Breach Record Book". This will be the first document the Board requests in a possible audit.
5. Post-Breach Improvement
The process doesn't end after the crisis subsides. Root cause analysis of the breach should be conducted, and to prevent recurrence:
- Technical vulnerabilities should be closed
- Personnel awareness training should be renewed
- Data retention and destruction policies should be reviewed
Conclusion: You're Not Alone in Crisis
Data breach management is not just an IT problem; it's a multidimensional legal battle. Proper management of the 72-hour period can save your company from millions in fines and irreparable reputation damage.
Entrust your processes to a professional plan, not to chance.

Author
Taha Kocal
Backend Engineer
Expert in cybersecurity and backend systems. Develops data breach response plans and security protocols.