Breached (Part 3)
The Fallout
This account is based on a real-world case. Names, locations, and identifying details have been changed or obscured to protect those involved and, frankly, to save a few blushes.
Day 7. Afternoon.
The meeting broke. Harwood’s reps packed their laptops with robotic precision, muttered vague apologies, and backed out of the boardroom like someone had died.
No one said it aloud, but something had.
Katie sat at the table for a long time after they left. Her hand rested on the printed support ticket—the one with that line. The one that turned a misconfiguration into a breach of trust.
She didn’t cry. She didn’t speak. She just stared.
Outside the boardroom, her staff were working as usual. Phone calls. Emails. End-of-month prep. They didn’t know yet.
But they would.
Because it’s never just one breach.
By 4 p.m., the first client had called. They’d seen the incident reported on a threat intelligence feed. They wanted answers.
More would follow.
Katie called her solicitor. Then her insurance broker. Then her PR contact.
I sat across from her. Calm. Clinical. Already thinking six steps ahead.
“Do we need to tell the ICO?” she asked.
“Yes,” I said. “You do.”
She nodded. I just wanted to let you know that I made the call.
The staff meeting happened the next morning. Grim but necessary. Questions followed:
Are we safe?
Was our data taken?
Why weren’t we told sooner?
The hardest one was from a senior associate who had been with the business since year three:
“Why were they still our provider?”
No one had an answer Katie liked.
A week later, Harwood IT was gone, and the contract was terminated. The full audit findings were passed to a solicitor, and a formal complaint was filed with the ICO and the NCSC.
The fallout rippled.
A handful of clients left—quietly, politely, decisively.
Two prospects paused onboarding. One never came back.
The insurance premium doubled.
Katie started sleeping with a notepad by the bed.
We deployed full endpoint protection. Rebuilt from clean images. Segmented the network. Reset every password. Shut down legacy services. Rolled out MFA.
It took six weeks just to stabilise.
And still, one thing lingered in the air: the breach wasn’t the end.
The cover-up was worse.
The business survived, but something changed in Katie. She no longer assumed competence and gave the benefit of the doubt. Every vendor, every tool, every system was scrutinised.
Because once you’ve seen behind the curtain, you don’t forget what you saw.
And trust, once broken, isn’t a security risk.
It’s an existential one.