PersonalBusinessServicesPricingLocationsBlogFAQContact 📞 +61 499 468 971 Free Consultation →
📞 Call Now
🛡️ Free Consult
HomeBlogWhat to Do in the First 24 Hours of a Cy…
← Back to all articles
🛡️ Business Security

What to Do in the First 24 Hours of a Cyberattack — The Melbourne Business Playbook

📅 January 8, 2026 ⏱ 7 min read

When a cyberattack hits your business, the actions you take in the first 24 hours have an enormous impact on the final outcome — the extent of data loss, the cost of recovery, your regulatory standing, and your relationship with customers. Businesses that have a documented response plan recover significantly faster and at lower cost than those responding reactively.

Before an Attack — Build Your Plan

Document your incident response plan before you need it. This should include: the contact details of your cybersecurity provider, your cyber insurance company, and your bank's fraud line. A list of your critical systems and who is responsible for each. Your backup locations and restoration procedures. Your Privacy Act notification obligations and the OAIC's notification portal. And the chain of communication — who needs to be informed internally and externally in what order.

Hour 1 — Contain the Damage

The first priority is preventing the attack from spreading. Disconnect affected computers from the network by unplugging ethernet cables and disabling WiFi. Do not turn computers off — this can destroy forensic evidence that may be needed for insurance claims and regulatory investigations. Alert all staff immediately not to use their devices until given the all-clear. Change passwords on critical accounts from an unaffected device. If you are an IntrusionX client, call +61 499 468 971 immediately — we have 24/7 incident response capability.

Hours 1-2 — Assess What Has Happened

With the spread contained, assess the situation: what type of attack is this — ransomware, data theft, email compromise, fraud? Which specific systems and data are affected? When did the attack begin — the visible event may be days after initial access? What data may have been accessed, stolen, or destroyed? Document everything you observe and the times of your observations — this is essential for insurance and regulatory purposes.

Hours 2-8 — Get Expert Help and Notify

Contact a cybersecurity incident response team. Contact your cyber insurer — most policies require prompt notification as a condition of coverage. Contact your bank if the attack involved financial fraud. Preserve forensic evidence before beginning recovery — do not wipe or rebuild systems until a cybersecurity professional has assessed them.

Hours 8-24 — Legal and Regulatory Obligations

Assess whether you have Privacy Act Notifiable Data Breaches obligations — you must notify the OAIC and affected individuals if the breach is likely to result in serious harm. If in doubt, seek legal advice. Begin documenting the incident comprehensively for your insurer. For ransomware incidents, do not pay without consulting a specialist — payment does not guarantee recovery and may create legal complications. IntrusionX provides 24/7 incident response for Melbourne businesses — contact us before an incident to ensure we are your first call when it matters.

Communications During an Incident

How you communicate during a cyber incident has significant implications for your legal liability, regulatory standing, and client relationships. Before the incident, establish who is authorised to communicate publicly about a security incident — typically only a designated spokesperson. During the incident, avoid public statements until you understand the scope and have legal guidance. Be aware that some communications — particularly emails and messages about the incident — may be discoverable in future legal proceedings. Your cyber insurer's incident response team will typically include communications guidance as part of their service.

Learning From the Incident

Every cyber incident, regardless of its severity, provides information that should be used to improve your security posture. After the immediate response is complete and normal operations have resumed, conduct a post-incident review: how did the attacker get in? What controls failed or were absent? What actions taken during the response worked well, and what could be improved? Update your incident response plan based on these findings. The goal is not to assign blame but to systematically close the gaps the incident revealed. IntrusionX can facilitate post-incident reviews for Melbourne businesses — contact us to discuss a structured review process.

Need help protecting your business or home?

IntrusionX provides independent cybersecurity for Melbourne businesses and families. Free consultation, no lock-in contracts.

← Previous Article Online Gaming Scams Targeting Australian Children — Roblox, … Next Article → I Think My Phone Has Been Hacked — What to Do Right Now

More Business Security Articles

Business Security

Business Email Compromise — How It Happens and How to Stop It

Business email compromise cost Australian businesses over $80 million last year. Here is exactly how…

Read more →
Business Security

Ransomware in Australia 2026 — The State of the Threat and What Businesses Must Know

Ransomware attacks on Australian businesses increased significantly in 2025. Here is the full pictur…

Read more →
Business Security

Cyber Insurance in Australia — What It Actually Covers (And What It Does Not)

Cyber insurance is becoming essential for Australian businesses. But many policies have exclusions t…

Read more →