top of page

When Did You Find Out? The Substack Breach and the Cost of Waiting

  • Feb 22
  • 2 min read

February 2026 | TAAUS Secure Technologies

Data Breach
Data Breach

In October 2025, Substack — a platform used by millions of writers, publishers, and businesses to communicate with their audiences — experienced a data breach. Usernames, email addresses, and account metadata were exposed.

Their subscribers found out in February 2026.

Four months passed between the breach and the notification. By the time users received the email, attackers had a four-month head start to use that data however they chose — targeted phishing, credential stuffing, social engineering, or simply selling it to the next buyer.


The Gap Between "We Knew" and "We Told You"

Substack is not alone. Delayed breach disclosure is one of the most persistent problems in cybersecurity, and it carries real consequences for the people on the other end of the notification email.

For business owners and managing partners, this story raises an uncomfortable question: if it happened to your organization, how long would it take you to even know — let alone tell your clients?

Most small and mid-sized firms don't have a formal incident response plan. There's no defined process for how a breach gets detected, who gets notified internally, who makes the decision to disclose, and within what timeframe. Without that structure, decisions get made reactively, inconsistently, and often too slowly.


What the Law Already Expects of You

Depending on your industry and the type of data you handle, breach notification is not optional. HIPAA requires covered entities to notify affected individuals within 60 days of discovering a breach. New York's SHIELD Act requires notification in the most expedient time possible. SEC rules now require public companies to disclose material cybersecurity incidents within four business days.

The regulatory environment is moving toward shorter timelines and stricter enforcement — not longer ones. Organizations that treat disclosure as a PR problem to manage rather than a legal obligation to fulfill are increasingly finding themselves on the wrong side of both regulators and clients.


What to Watch

The Substack breach is a preview of a broader trend. Regulators in the US and EU are actively tightening notification windows, expanding the definition of what counts as a reportable breach, and increasing penalties for delayed or incomplete disclosure. The FTC, HHS, and state attorneys general have all signaled this as an enforcement priority in 2026.

For business owners, the question is no longer whether a breach will happen — statistically, it's when. The organizations that come through those moments with their client relationships and reputations intact are the ones that knew exactly what to do before it happened: how to detect it quickly, how to contain it, and how to communicate it clearly.

A four-month gap is not a cybersecurity failure alone. It's a planning failure. And planning is something you can address right now, before the clock starts.


Stay Ahead of the Next Threat

Attackers don't wait. Neither should you. Get expert insights, threat updates, and best practices from TAAUS delivered to your inbox every month — or schedule a consultation to assess your security posture today.


bottom of page