This study aims to find appropriate measures to avoid similar incidents in the future and make changes in the company IT policies. It covers the IT system, staff responsibilities, and IT policies to determine the loopholes in the existing system. The plan includes backup strategy, testing schedule, risk assessment, business impact analysis, and determining strategies. The study concludes with newer policies that must be included to avoid future risks.