Building Trust Through Effective Communication During a Cybersecurity Data Breach


Authors : Uduak Ekott; Toyosi Kuteyi; Onyinyechi Enwereazu

Volume/Issue : Volume 10 - 2025, Issue 9 - September


Google Scholar : https://tinyurl.com/yw5rwj7a

Scribd : https://tinyurl.com/43u763xv

DOI : https://doi.org/10.38124/ijisrt/25sep1507

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : Organizations are constantly at risk from cybersecurity data breaches, which present serious communication challenges and technical threats. In addition to the operational and financial consequences, stakeholder trust, reputation, and resilience are all greatly influenced by organizational communication after a breach. Using Horsager's pillars of trust and communication framework of the National Institute of Standards and Technology's (NIST) Incident Response Recommendations, the paper discusses the crucial role that trust plays in cybersecurity communication. Using the Uber case study, it concludes that proactive and strategic communication can help reduce harm. According to the report, effective strategies for a successful response include employee training, preplanned communication protocols, and real-time monitoring. Finally, according to the study, companies can use data breaches as an opportunity to show more accountability and build trust, thereby protecting their reputation and stakeholder relationships in the process.

Keywords : Cybersecurity Communication, Data Breaches, Crisis Communication, Organisational Trust, Stakeholder Trust, Transparency, Crisis Management, Trust-Building Strategies, Corporate Reputation.

References :

  1. Appiah, B., & Maharjan, R. (2020). Developing and Maintaining Trust Within Organizations: Tech One Global in Nepal. Master's thesis, University of Gavle. https://www.diva-portal.org/smash/get/diva2:1441710/FULLTEXT01.pdf
  2. BBC. (2015, October 23). TalkTalk cyber-attack: website hit by ’significant’ breach https://www.bbc.co.uk/news/uk-34611857
  3. BBC. (2018, September 27). Uber pays $148m over data breach cover-up. https://www.bbc.com/news/technology-45666280?utm 
  4. Chen, SY., Ahlstrom, D., & Uen, JF. (2025). Organizational trust and employee work outcomes: A moderated mediation model. Curr Psychol 44, 6565–6578 (2025). https://doi.org/10.1007/s12144-025-07626-0
  5. Creswell, J. W., & Creswell, J. D. (2018). Research Design: Qualitative, Quantitative, and Mixed Methods Approaches (5th ed.). Sage.
  6. Codex Y. (2023). Understanding the impact of data breaches on consumer perception and reputation management: a review of effective communication and trust building strategies. Yubetsu codex computer science, 1(4). https://codex.yubetsu.com/article/eb84a2d618cd40cf9d2e14f1e0689dfd
  7. Coombs, W.T. (2015). The value of communication during a crisis: Insights from strategic communication research, Business Horizons, 58 (2), 142. https://www.sciencedirect.com/science/article/pii/S0007681314001505
  8. European Data Protection Board (EDPB). (2023). Guidelines on personal data breach notification under GDPR Version 2.0. https://www.edpb.europa.eu/system/files/2023-04/edpb_guidelines_202209_personal_data_breach_notification_v2.0_en.pdf?utm  
  9. The Guardian (2017, November 22). Uber concealed massive hack that exposed data of 57m users and drivers. https://www.theguardian.com/technology/2017/nov/21/uber-data-hack-cyber-attack?utm 
  10. Gautam, P. K. (2024). Crisis to resilience: cultivating effective internal communication for employee engagement and organizational trust. Quest Journal of Management and Social Sciences, 6(3), 560. https://doi.org/10.3126/qjmss.v6i3.72488
  11. Gupta, R., Pandey, P., Singh, V.K. & Sinha, K. (2025). Effectiveness of Cybersecurity Measures in Building Customer Trust in Digital NBFC Services.  International Journal of Latest Technology in Engineering Management & Applied Science, 14(6), 890-899. https://doi.org/10.51583/IJLTEMAS.2025.140600098
  12. Harvard Business Review. (2016, Octobeer 7). Your Company Needs a Communications Plan for Data Breaches.  https://hbr.org/2016/10/your-company-needs-a-communications-plan-for-data-breaches?utm  
  13. Hendrith, M. (2018). The effects culture and communication have on business. Integrated Studies, 120. https://core.ac.uk/download/pdf/158221587.pdf
  14. Horsager, D. (2019). Trust: The Leading Indicator (The 8 Pillars of Trust). https://davidhorsager.com/category/8-pillars/?utm_source=chatgpt.com 
  15. Ibrahim, A., Thiruvady D., Schneider J.G, & Abdelrazek .M. (2020). The challenges of leveraging threat intelligence to stop data breaches. Frontiers in Computer Science, 2. https://www.frontiersin.org/journals/computer-science/articles/10.3389/fcomp.2020.00036/full
  16. Kebande, V.R., Karie, N.K., Ikuesan, R.A. (2020). Real-time monitoring as a supplementary security component of vigilantism in modern network environments. International Journal of Information & Technology. 4. https://arxiv.org/pdf/2012.03622
  17. Knight R., & Nurse, J.R.C. (2020). A framework for effective corporate communication after cyber security incidents. Computer and Security Journal, 99. https://www.sciencedirect.com/science/article/pii/S0167404820303096
  18. Muzatko, S. & Bansal, G. (2024); It pays to be forthcoming: timing of data breach announcement, trust violation, and trust restoration. Internet Research; 34 (5): 1629–1663. https://www.emerald.com/intr/article/34/5/1629/1224207/It-pays-to-be-forthcoming-timing-of-data-breach
  19. National Institute for Standards and Technology (NIST). (2012). Computer security incident handling guide. United States of America https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf?utm  
  20. National Institute for Standards and Technology (NIST). (2024). Data confidentiality: Detect, respond to, and recover from data breaches. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-29.pdf
  21. National Institute for Standards and Technology (NIST). (2025). Incident response recommendations and considerations for cybersecurity risk management. United States. of America. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r3.pdf
  22. Nikkhah, H. R., & Grover, V. (2024). Strategizing Responses to data breaches: a multi-method study of organizational responsibility and effective communication with stakeholders. Journal of Management Information Systems, 41(4), 1042–1077. https://doi.org/10.1080/07421222.2024.2415774 https://www.tandfonline.com/doi/epdf/10.1080/07421222.2024.2415774?needAccess=true  
  23. Oldfield, N.D. & Kushniryk, A. (2017). Building and protecting organizational trust with external publics: Canadian senior executives’ perspectives. Canadian Journal of Communication 42 (5), 768. https://cjc.utppublishing.com/doi/pdf/10.22230/cjc.2017v42n5a3076
  24. Ou, C.X., Zhang, X., Angelopoulos, S.  Davison, R.M., Janse, N. (2022). Security breaches and organization response strategy: Exploring consumers’ threat and coping appraisals. https://www.sciencedirect.com/science/article/pii/S0268401222000299?utm_source=chatgpt.com
  25. Perera, S., Jin, X., Maurushat, A., & Opoku, G. J. (2022). Factors affecting reputational damage to organisations due to cyberattacks. Informatics, 9(1), 28. https://doi.org/10.3390/informatics9010028 
  26. ProAssurance. (2024). Crisis communication strategies after a healthcare data breach. https://riskmanagement.proassurance.com/article-library/crisis-communication-strategies-after-a-data-breach?utm_source=chatgpt.com
  27. Vokić, P., Bilušić, M.R., Najjar, D. (2020). Building organizational trust through internal communication. Corporate Communications: An International Journal 26 (1), 70.  https://www.emerald.com/ccij/article-pdf/26/1/70/408900/ccij-01-2020-0023.pdf

Organizations are constantly at risk from cybersecurity data breaches, which present serious communication challenges and technical threats. In addition to the operational and financial consequences, stakeholder trust, reputation, and resilience are all greatly influenced by organizational communication after a breach. Using Horsager's pillars of trust and communication framework of the National Institute of Standards and Technology's (NIST) Incident Response Recommendations, the paper discusses the crucial role that trust plays in cybersecurity communication. Using the Uber case study, it concludes that proactive and strategic communication can help reduce harm. According to the report, effective strategies for a successful response include employee training, preplanned communication protocols, and real-time monitoring. Finally, according to the study, companies can use data breaches as an opportunity to show more accountability and build trust, thereby protecting their reputation and stakeholder relationships in the process.

Keywords : Cybersecurity Communication, Data Breaches, Crisis Communication, Organisational Trust, Stakeholder Trust, Transparency, Crisis Management, Trust-Building Strategies, Corporate Reputation.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe