Provide a basic, actionable outline for responding to a data breach, covering immediate actions and notification requirements.
Role: Act as a cybersecurity incident responder. Task: Outline the initial steps for responding to a data breach. Context: Assume a small to medium-sized business scenario. Format: Present a numbered list of key actions. Constraints: Focus on immediate response and initial notification considerations.
Generate a detailed guide for creating and enforcing a robust password policy, including best practices and user education strategies.
Generate a detailed plan for a phishing simulation exercise, including scenario design, target audience, and success metrics.
Develop a detailed strategy for reverting a software deployment in case of critical failure, minimizing downtime and data loss.