Organizational Security

Security Incident Communication Guide

How to communicate during and after a security incident without making things worse. Templates, timelines, and principles for crisis communication.

Michael
Security Writer
7 min read

The way you communicate during a security incident determines whether your organization emerges with credibility intact or permanently damaged. Technical response, identifying the breach, containing it, remediating the vulnerability, is necessary but not sufficient. How you talk about what happened matters as much as what you do about it.

I've watched organizations handle incident communication brilliantly and disastrously, sometimes within the same industry in the same year. The difference isn't resources or legal counsel. It's preparation and principles.

The Communication Failure Modes

Before covering what to do, it's worth understanding what goes wrong.

Too slow. Delaying communication breeds speculation. In the absence of official information, employees, customers, and journalists fill the void with worst-case assumptions. The longer you wait, the worse those assumptions get.

Too vague. "We experienced a security event and are investigating" tells stakeholders nothing useful. It signals that you either don't know what happened or won't say, neither of which builds confidence.

Too technical. A communication full of CVE numbers, attack vector descriptions, and protocol-level details overwhelms non-technical stakeholders. They want to know: What happened? Am I affected? What should I do? What are you doing about it?

Too defensive. Communications that minimize the incident, blame others, or focus on how sophisticated the attacker was erode trust. Stakeholders can tell when you're managing perception rather than addressing the problem.

Inconsistent. Different messages to different audiences that contradict each other create confusion and the appearance of dishonesty. Your customer communication, employee communication, and media statements should tell the same story.

The Communication Timeline

Incident communication happens in phases. Each phase has different objectives and audiences.

Phase 1: Initial Notification (0-4 hours)

Objective: Acknowledge the incident and establish communication channels.

Audience: Internal stakeholders (executive team, legal, PR), and if the incident is customer-facing, an initial customer notification.

Content: What you know, what you don't know, what you're doing. It's acceptable to say "we're investigating an incident affecting [system/service]. We'll provide updates every [interval]."

Key principle: Speed matters more than completeness. A brief, honest acknowledgment in the first hours is better than a comprehensive statement three days later.

Phase 2: Detailed Update (4-24 hours)

Objective: Provide substantive information about the incident scope and impact.

Audience: All stakeholders who need to take action (customers who should change passwords, partners who should review access, employees who should watch for social engineering).

Content: What happened (in plain language), who is affected, what data was involved, what actions stakeholders should take, what you're doing to contain and remediate.

Key principle: Actionable information. Every communication should tell the recipient something they can do.

Phase 3: Ongoing Updates (24 hours - resolution)

Objective: Maintain trust through consistent updates as the investigation progresses.

Audience: All stakeholders, with appropriate detail levels for different audiences.

Content: Investigation progress, new findings, revised scope (if applicable), continued remediation status.

Key principle: Regular cadence. Even if there's no new information, a "no significant new findings since last update" message is better than silence.

Phase 4: Post-Incident Communication (after resolution)

Objective: Provide a comprehensive account of what happened, what was affected, and what changes are being made to prevent recurrence.

Audience: All stakeholders, plus regulatory bodies if applicable.

Content: Root cause analysis (appropriate level of detail for the audience), full scope of impact, remediation completed, improvements planned or implemented.

Key principle: Accountability. Own the failure. Describe what you're changing. Provide a mechanism for affected parties to ask questions.

Audience-Specific Communication

Different audiences need different messages. The facts don't change, but the framing and level of detail should.

Customers

Customers care about: Is my data safe? What should I do? Can I trust you?

  • Lead with what happened and how it affects them specifically
  • Provide clear, specific actions they should take (change password, review account activity, enable MFA)
  • Explain what you're doing to prevent recurrence
  • Provide a support channel for questions
  • Don't make them search for the notification. Email directly.

Employees

Employees care about: What happened? What should I tell customers? Is my job affected?

  • Provide more technical detail than customer communications
  • Include guidance on how to respond to customer and media inquiries
  • Be transparent about severity. Employees who discover the situation is worse than communicated internally lose trust permanently.
  • Clarify roles and responsibilities during the incident response

Executives and Board

Executives care about: What's the business impact? What's the liability? What's the timeline?

  • Lead with business impact: affected customers, revenue risk, regulatory exposure
  • Provide a timeline for containment and resolution
  • Outline resource needs for response and remediation
  • Identify decision points that require executive input

Media

Media care about: What happened? Who's affected? What are you doing about it?

  • Prepare a written statement before engaging with reporters
  • Stick to facts. Avoid speculation.
  • Don't say "no comment" unless there's a legal requirement to say nothing. It reads as evasion.
  • Designate a single spokesperson. Multiple voices create inconsistency.

Regulators

Regulators care about: What happened? What data was affected? Were notification requirements met?

  • Know your notification timelines. GDPR requires 72-hour notification. Other regulations vary.
  • Provide factual, complete information
  • Document your response timeline and actions taken
  • Engage legal counsel before regulatory communication

Communication Templates

Initial Customer Notification

Subject: Security Incident Notification - [Company Name]

We're writing to inform you of a security incident that may affect your account. On [date], we detected unauthorized access to [system/data type]. We're actively investigating the scope and impact.

What we know so far:

  • [Brief factual description]
  • [What data may be affected]

What you should do:

  • [Specific action 1]
  • [Specific action 2]

We will provide an update by [specific time/date]. If you have questions, please contact [support channel].

Post-Incident Summary

Subject: Security Incident Update - Investigation Complete

On [date], we disclosed a security incident involving [brief description]. Our investigation is now complete, and we want to share what we found.

What happened: [Clear, plain-language description of the incident]

What was affected: [Specific data types and number of affected users]

What we've done: [Remediation actions taken]

What we're changing: [Improvements to prevent recurrence]

If you were affected: [Specific actions and support resources]

Principles That Hold Under Pressure

When an incident is unfolding and decisions have to be made quickly, these principles guide good communication:

Assume everything you say will become public. Internal messages get leaked. Confidential briefings get shared. Communicate as if every statement will be on the front page.

Never lie. Partial information is acceptable. Uncertainty is acceptable. Deception is never acceptable. If discovered, and it usually is, dishonesty during an incident causes more damage than the incident itself.

Don't blame the victim. "Users should have had stronger passwords" or "the affected data was publicly available anyway" shifts blame to the people you're supposed to be protecting.

Coordinate before communicating. Legal, PR, engineering, and executive teams should review significant communications. But don't let coordination become a bottleneck that delays communication beyond acceptable timeframes.

Over-communicate internally. Employees who feel informed make better decisions and provide better customer support. Under-communicating to employees creates confusion and anxiety.

How Safeguard.sh Helps

When a supply chain incident occurs, Safeguard.sh provides the factual foundation that makes accurate communication possible. The platform tells you exactly which applications are affected by a compromised dependency, what data those applications handle, and the specific scope of exposure. Instead of spending days determining impact while stakeholders wait for answers, your incident communication team has the data they need to make accurate, specific statements from the first notification onward. Safeguard.sh turns "we're investigating the scope" into "we've identified the affected systems and here's what we're doing about it."

Never miss an update

Weekly insights on software supply chain security, delivered to your inbox.