Simulation note: This is a controlled teaching artefact for The LotusCare Breach (Simulation).
Content is fictional and designed to model organisational decision-making under uncertainty.
No real personal data, real ransomware instructions, or operational steps are included.
Comms & Notifications
Draft statements and message maps. These are not final approvals. Avoid definitive claims without corroboration.
External holding statement (draft)
LotusCare Services is investigating an alleged cyber incident.
We have engaged specialist support and are working to restore services as a priority.
At this stage we are assessing the nature and scope of the incident, including any claims made externally.
We will provide further updates as information is confirmed.
Client advisory (draft)
We are aware of reports relating to a cyber incident impacting LotusCare systems.
We are currently assessing what occurred and whether personal information may have been involved.
As a precaution, we recommend clients remain alert to suspicious messages that request personal details.
We will contact affected individuals directly if we confirm their information is involved.
Message map (internal)
| Question | Safe answer pattern | What to avoid |
|---|---|---|
| Was data stolen? | “We are assessing external claims; we will update if confirmed.” | “Yes / No” without evidence. |
| How many clients? | “We do not have verified numbers at this time.” | Repeating media numbers. |
| Did you pay a ransom? | “We do not comment on details that may affect an investigation.” | Speculation or justification. |