When a company has identified and assessed a risk, there are four main strategies it can use to deal with it:
In this article, we explore what each strategy means – and how to apply them in practice.
This means steering clear of the risk altogether. A business may choose not to pursue an activity that brings the risk in the first place.
Example from data protection: When hiring new employees, an organisation collects information about their health or past criminal convictions. If this data were to fall into the wrong hands, the consequences could be severe. To avoid this risk, the company could simply decide not to collect such information at all.
{{factbox-dark}}
If a risk can’t be avoided, it may be possible to reduce it. Risk is calculated as the product of likelihood and impact – so lowering either one reduces the overall risk.
Many information security measures aim to reduce likelihood: Firewalls, access controls and phishing awareness training are all designed to prevent incidents from happening in the first place.
Other controls target the impact side: A strong backup strategy can significantly reduce downtime and damage following a ransomware attack, for instance.
Sometimes, it makes sense to shift the risk to a party better equipped to manage it.
You might:
{{factbox-light}}
In many cases, organisations simply choose to accept the risk. And that can be a valid decision – provided it's informed and deliberate.
You might accept a risk if:
What matters is how the decision is made. A structured process should define who can accept risks – and at what level.
For example:
🔗 Read more on the role of leadership in risk and security work:
Risk management is a core element of effective data protection and information security. Here are some resources to explore further:
Risk management typically includes four steps:
Get a clear overview of your risks – and manage documentation, follow-ups and accountability in one place. See how our platform can turn risk strategies into action.