Exactly what to do in the first 72 hours after a cyber breach. Step-by-step. No panic. No guesswork. Includes NZ Privacy Act obligations.
Designate one person to coordinate. This person makes all decisions for the next 72 hours. If you don't have an incident lead, the most senior available person takes this role. Write down the time of discovery.
Unplug ethernet cables. Disable Wi-Fi. Do NOT power off machines (forensic evidence is in RAM). Isolate affected devices but keep them turned on. If you power off, you lose critical evidence.
Domain admin, cloud admin (Azure/AWS/GCP), email admin, firewall admin, VPN. Use a clean device to make these changes, not a potentially compromised one. Enable MFA if not already active.
Screenshot everything: error messages, ransom notes, unusual files, running processes. Photograph screens if needed. Do NOT delete anything. Do NOT run antivirus yet — it can destroy forensic artefacts.
Start a log: when was the breach discovered? Who noticed it? What systems are affected? What's the current status? This timeline becomes critical for Privacy Commissioner reporting and insurance claims.
Contact your IT provider, cybersecurity partner, or insurer's IR hotline. If you have nobody: call CERT NZ on 0800 CERT NZ (0800 2378 69). They provide free guidance to NZ businesses.
The average eCrime breakout time is 29 minutes. That's how fast attackers move from initial access to lateral movement across your network. The fastest recorded breakout: 27 seconds. Internal detection saves an average of $900,000 compared to external notification. Sources: CrowdStrike 2026 GTR, Cobalt
If you're reading this during a breach, understand: the attacker likely already has your data. Modern attacks exfiltrate before encrypting. Your immediate priority is containment and credential revocation, not trying to decrypt files. The data is already gone — your job is to stop it getting worse and understand what was taken.
The "Kazu" threat group exfiltrated 400,000+ health documents including clinical notes, lab results, vaccination records, and medical photographs. Multiple general practices across NZ were affected. The Privacy Commissioner launched a formal inquiry.
40% of NZ SMBs say a $100,000 attack would shut them down (VikingCloud 2026). Yet only 38% of breach victims fix the vulnerability that allowed the initial attack (Cobalt). The ManageMyHealth breach shows it can happen to any NZ organisation — and the consequences are severe. The best time to prepare your response plan was last year. The second best time is now.
What data was accessed? Customer records, financial data, health information, employee details? Which systems were compromised? How many records were potentially affected? This determines your legal obligations.
Was it phishing? A stolen credential? An unpatched vulnerability? A misconfiguration? Understanding the entry point is essential to preventing re-entry. 90% of incidents involved misconfigurations that enabled the attack.
Review logs for large data transfers, unusual outbound connections, or cloud storage access. Attackers often exfiltrate data before deploying ransomware. 93% of ransomware victims who paid still had their data stolen.
Your lawyer can advise on Privacy Act obligations, client communication, and insurance claims. If personal data was breached, you likely have a mandatory notification obligation under the NZ Privacy Act 2020.
If you have cyber insurance, notify them within the required window (typically 24-48 hours). Delayed notification can void your coverage. Provide your incident timeline and evidence.
Brief your leadership team. Prepare a holding statement for staff. Instruct employees NOT to discuss the breach externally or on social media until the official response is coordinated.
Under the Privacy Act 2020, you must notify the Privacy Commissioner of any breach that has caused, or is likely to cause, serious harm. Use NotifyUs: privacy.org.nz/notify-us. Report as soon as practicable.
If the breach is likely to cause serious harm, you must also notify the affected individuals. Be honest, clear, and specific about what data was compromised and what actions they should take (e.g., change passwords, monitor accounts).
Report the incident at cert.govt.nz/report or call 0800 CERT NZ. For nationally significant incidents, the NCSC can provide specialist investigation support. They handled 300+ specialist cases in 2024/25.
Report to NZ Police online at police.govt.nz. For significant financial loss, contact the Financial Crime Unit. Keep your incident number — insurers and the Privacy Commissioner may require it.
Prepare a public statement if needed. Be transparent but controlled. Focus on: what happened, what you're doing about it, and what affected parties should do. Avoid blame and speculation. Customers respect honesty.
Patch the vulnerability that was exploited. Only 38% of breach victims fix the vulnerability that allowed the initial attack. Rebuild compromised systems from clean backups. Do NOT restore from backups that may also be compromised.
Since December 2020, NZ businesses have a mandatory obligation to report privacy breaches that cause or are likely to cause serious harm. Failure to comply can result in fines up to $10,000 for individuals or investigation and enforcement action by the Privacy Commissioner. The ManageMyHealth breach (January 2026) triggered a formal Privacy Commissioner inquiry after 120,000+ patient records were stolen. Source: Privacy Act 2020, NZ media
83% of businesses that paid were attacked again. 93% still had their data stolen. Paying funds criminal operations and marks you as a willing payer for future attacks.
RAM contains forensic evidence (encryption keys, running processes, network connections). Disconnect from the network instead. Powering off destroys evidence your investigators need.
Antivirus can quarantine or delete malware artefacts that forensic investigators need to understand the attack. Wait for professional guidance before cleaning any systems.
Unless directed by law enforcement or a professional negotiator. Responding can reveal information about your organisation, signal willingness to pay, or trigger accelerated data destruction.
You may instinctively want to "clean up." Don't. Logs are your evidence trail for the Privacy Commissioner, insurers, police, and your own investigation. Preserve everything.
Attackers often compromise backups before deploying ransomware. Restoring an infected backup reinfects your systems. Verify backup integrity before any restoration.
What you say publicly can have legal, regulatory, and reputational consequences. Get legal sign-off before any press releases, social media posts, or customer emails.
Attackers frequently maintain persistence (backdoors, new accounts, scheduled tasks). Only 38% of breach victims fix the original vulnerability. Without thorough investigation, they'll be back.
CERT NZ: 0800 2378 69
CERT NZ report: cert.govt.nz/report
Privacy Commissioner: privacy.org.nz/notify-us
NZ Police online: police.govt.nz
Do NOT pay. 83% who pay get attacked again.
Do NOT power off. Evidence is in RAM.
Do NOT restore backups without verification.
Call CERT NZ immediately.
The businesses that recover fastest are the ones that had a plan before the breach. Don't wait for the call from your IT team at 2am.
Start with our free security assessment — 20 questions across 6 domains, with a personalised radar chart, risk exposure in NZD, and a prioritised action plan.
Take Your Free Security Score →Every business has different security challenges. Book a free 15-minute chat and we'll recommend the right approach — no obligation.
Mustafa Demirsoy
Founder & Hacker, WeHack
wehack.co.nz | info@wehack.co.nz | 022 091 7242
148 Durham Street, Tauranga 3110