Breached (Part 4)
Lessons Learned
This account is based on a real-world case. Names, locations, and identifying details have been changed or obscured to protect those involved and, frankly, to save a few blushes.
In the aftermath, it’s easy to say, “We should’ve known.”
It’s harder—and more valuable—to ask: what would we do differently?
Katie and her team did recover. But it cost them. Time, money, clients, sleep, and trust. And while they’ve emerged stronger and sharper, they’re also warier. A little less forgiving. A little more switched on.
Here’s what they—and you—should take away from what happened.
1. Your MSP is not a firewall. They are a vendor. Their job is to sell you things—licences, hardware, services. That doesn’t make them bad; it makes them commercial. But think again if you think they exist to challenge themselves or expose their weaknesses. That’s why an independent advisor—a fractional CIO or CISO—is worth their fee. Someone whose loyalty lies with you, not their bottom line. Someone who asks awkward questions, spots the blind spots, and keeps everyone honest. You're assuming too much if you’re not asking them hard questions. And if they’re offended when you do? That’s your most enormous red flag.
2. You must be breach-ready. Not breach-proof. That’s a myth. But you can be prepared to respond fast. Have a playbook. Know who to call. Run drills. Pretend the breach happened tomorrow. What would you do first?
3. Logging is non-negotiable. If you can’t see it, you can’t investigate it. If your provider can’t produce logs or refuses to share them, you have a governance problem, not just a tech one.
4. Do not rely on goodwill. The nicest technician in the world can’t stop a breach if their process is broken. Ask about patching. Ask about alerting. Ask about independence. And then ask them to prove it.
5. Trust—but verify. Yes, even your MSP. Especially your MSP.
6. Breach disclosure is a strategy, not a panic button. Silence breeds suspicion. Katie’s reputation survived because she acted early, honestly, and decisively. She notified the ICO, briefed clients, told the truth. And they remembered that.
7. Cyber insurance won’t cover dishonesty. If your provider lied—or buried the logs—you’re exposed. Katie’s premiums doubled. Not because she was breached… but because someone tried to bury the evidence.
8. Technical debt is real. Old servers. Weak passwords. Legacy systems. You can ignore them—until they become the crack the whole system falls through.
9. Nothing beats transparency. Katie shared what happened internally and externally, not to blame but to learn. Her team grew, her vendors adapted, and her clients stayed because she owned it.
10. The call might never come. But if it does… Don’t panic. Don’t lie. Don’t delay. Ask for help. Bring in someone external. And if you ever see the phrase “Do not tell the client”? Please make sure you are the one who hears about it first.
Final Word:
This series was based on a real business, a real breach, and real fallout. It wasn’t the result of an elite nation-state attack. It was a misconfiguration. An oversight. And a cover-up.
What saved the business wasn’t technology. It was decisiveness. Leadership. And a refusal to be misled.
There is no such thing as a small breach. Only a short window to get it right.
Act fast. Ask better questions. And never ever assume silence means safety.