[{"@context":"https:\/\/schema.org\/","@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/uncategorized\/what-to-do-after-a-data-leak-5-critical-steps\/#Article","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/uncategorized\/what-to-do-after-a-data-leak-5-critical-steps\/","headline":"What to Do After A Data Leak: 5 Critical Steps","name":"What to Do After A Data Leak: 5 Critical Steps","description":"What to Do After A Data Leak: 5 Critical Steps No matter how many security procedures you follow, a data leak can still happen. Make sure you&#8217;re prepared in the event of an emergency with our five key steps. There were almost 1600 data breaches in the United States during 2017. Despite increased security measures, [&hellip;]","datePublished":"2018-05-08","dateModified":"2018-05-08","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/protonsiteadmin\/#Person","name":"ProtonSiteAdmin","url":"https:\/\/www.protondata.com\/blog\/author\/protonsiteadmin\/","identifier":1,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/f892abcc032eee14738cab0f8a79f5116d70bcb647eb5e2655f162d4f14aba64?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f892abcc032eee14738cab0f8a79f5116d70bcb647eb5e2655f162d4f14aba64?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2018\/05\/What-to-Do-After-A-Data-Leak.jpeg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2018\/05\/What-to-Do-After-A-Data-Leak.jpeg","height":1333,"width":2000},"url":"https:\/\/www.protondata.com\/blog\/uncategorized\/what-to-do-after-a-data-leak-5-critical-steps\/","about":["Uncategorized"],"wordCount":614},{"@context":"https:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.protondata.com\/blog\/#breadcrumbitem"},{"@type":"ListItem","position":2,"name":"Uncategorized","item":"https:\/\/www.protondata.com\/blog\/\/uncategorized\/#breadcrumbitem"},{"@type":"ListItem","position":3,"name":"What to Do After A Data Leak: 5 Critical Steps","item":"https:\/\/www.protondata.com\/blog\/uncategorized\/what-to-do-after-a-data-leak-5-critical-steps\/#breadcrumbitem"}]}]