Say This, Not That: What to Avoid Saying in Security Updates While Preserving Availability and Trust
Ever had a bridge call go sideways because someone said “breach” when it was just an outage? In this lesson, you’ll learn exactly what to say—and what to avoid—so your updates preserve availability, protect regulatory posture, and maintain stakeholder trust. Expect crisp distinctions (availability vs. security), vetted phrase banks, modular templates by audience, and hands-on micro-drafts with checks to validate your wording. You’ll leave ready to ship calm, compliant updates with blameless precision and a clear next-update cadence.
Introduction: Why Words Matter in Security Updates
Security updates are not just technical notes; they are legal, reputational, and trust-defining documents. The central skill is choosing words that accurately describe what you know—no more, no less—while keeping stakeholders informed and calm. This lesson shows you how to avoid language that creates unnecessary risk and how to use precise, neutral phrases that preserve availability and trust.
Two concepts must be separated at all times: an availability incident and a security breach. An availability incident refers to systems being slow, inaccessible, or degraded—often due to hardware failure, network issues, or configuration errors. A security breach involves unauthorized access, data exfiltration, or manipulation by an attacker. These are not the same, and mixing them can create legal exposure, trigger regulatory duties, or cause panic among customers.
Word choice matters for three reasons:
- Legal exposure: Certain words (like “breach” or “compromise”) can imply confirmed facts that may activate mandatory reporting obligations, breach notification laws, or contractual penalties. If those facts are later disproven, your earlier update may still be used against you.
- Trust and credibility: Overstating or understating risk erodes credibility. Stakeholders trust updates that are factual, time-bound, and transparent about uncertainty. They distrust promises you cannot keep.
- Regulatory triggers: Different jurisdictions define “breach” and “incident” differently. Using a regulated term without evidence can start a regulatory clock prematurely, narrowing your response options and increasing potential liabilities.
The goal is to communicate clearly, quickly, and defensibly. You do this by explicitly separating availability from security, reporting only what is known, and using cautious, evidence-based language.
1) Core Concept with Contrasts: Availability Outage vs. Security Breach
When systems go down or run slowly, people often assume “We were hacked.” This assumption can cause mistakes in updates. Instead, start by classifying what is truly happening.
- Availability outage: Users cannot access the service or experience partial features. Common causes include network congestion, DNS misconfiguration, resource exhaustion, or a failed deployment. While attack traffic (like a DDoS) can cause outages, the presence of downtime does not prove unauthorized access.
- Security breach: Evidence shows that data, systems, or credentials have been accessed, modified, or exfiltrated by unauthorized parties. Indicators might include verified intrusion logs, confirmed credential misuse, or forensic findings.
When crafting updates, separate these categories. If you are investigating an outage with no evidence of unauthorized access, avoid breach language. If you have indicators that suggest a security event, say you are investigating potential unauthorized access—without asserting it as fact until confirmed.
Why does this distinction matter?
- Legal exposure: Declaring a “breach” can obligate customer notifications, regulator filings, and contractual remedies. If that declaration is premature, you may face reputational harm and costs without a legal requirement.
- Trust: Customers accept that complex systems have outages. They expect timely restoration and honest status updates. They will not accept careless claims about security. Care is shown through precision: what you know, when you learned it, and what you are doing next.
- Regulatory triggers: Some terms are defined in law or in contracts. Using them incorrectly can force timelines that you cannot meet or turn a routine outage into a perceived compliance failure.
2) Risky vs. Safe Language: A Red-Flag/Green-Light Framework
Your language should reflect your evidence level. Think in stages: suspected, investigating, confirmed. At each stage, choose phrasing that is neutral, time-bound, and reversible if your understanding changes.
-
Evidence level: Suspected
- What you have: Signals that something is wrong (alerts, user reports, anomalies) without proof of cause.
- Risky language to avoid: Anything that states or implies compromise, data loss, or fault assignment. Avoid absolutes like “no data was affected” unless you have evidence to support it.
- Safe language: State the symptom, scope as currently understood, and the action underway. Emphasize ongoing investigation and expected updates.
-
Evidence level: Investigating
- What you have: Active triage with some leads, but uncertainty remains. You may have contained systems or rolled back changes.
- Risky language to avoid: Legal admissions (e.g., “we failed to patch”), speculative causes (“likely attacker”), or commitments that bind you (“we will restore service in 30 minutes”) unless you can confidently deliver.
- Safe language: Use time-bound qualifiers (“as of [time]”), limit statements to observed facts, and define next steps (containment, forensics, communication cadence) without promising outcomes.
-
Evidence level: Confirmed
- What you have: Validated facts from logs, forensics, or third-party verification.
- Risky language to avoid: Over-disclosure that harms containment, blame directed at named vendors or individuals, and definitive statements about future risk (“this cannot happen again”).
- Safe language: Present verified facts, scope as known, protective actions taken, and the plan for updates. Use controlled terms aligned with your legal and regulatory posture.
Use red-flag and green-light phrases to guide your wording. Red-flag phrases often imply certainty, fault, or guarantees you cannot support. Green-light phrases are neutral, precise, and scoped by time and evidence.
-
Red-flag tendencies
- Stating a breach without evidence
- Making promises of timelines or outcomes
- Assigning blame or fault prematurely
- Absolute assurances of safety or completeness
- Technical jargon that implies compromise (“exfiltration,” “credential stuffing”) without proof
-
Green-light tendencies
- Time-stamping knowledge (“as of [UTC time]”)
- Describing observable symptoms and mitigations
- Acknowledging uncertainty (“we are investigating potential causes”)
- Defining the next update window
- Using conditional language when appropriate (“we have not observed evidence of X at this time”)
This framework ensures your updates remain flexible as facts change. It communicates discipline and reduces the risk of creating legal obligations through careless phrasing.
3) Audience-Specific Adaptation: Modular Templates
Different audiences need different levels of detail and different framing—but the core facts must stay consistent. Think of one factual backbone and multiple audience views.
-
Customers
- Focus: Impact on service, what they can expect, and how to get help.
- Include: Current symptoms (“some users may experience… ”), steps taken to restore service, any customer actions (e.g., retry, status page), the next update time.
- Exclude: Speculative root causes, forensics details, or legal conclusions. Avoid language implying data exposure unless confirmed.
-
Executives/Board
- Focus: Business impact, risk posture, legal and PR strategy, and resource needs.
- Include: High-level impact metrics (uptime, customer segments affected), regulatory posture (reporting thresholds and timing), remediation plan, and stakeholder messaging plan.
- Exclude: Unvetted technical theories or vendor blame. Keep the message aligned with legal counsel guidance.
-
Regulators
- Focus: Compliance with definitions, timelines, and required content in your jurisdiction.
- Include: Factual timeline, scope as known, systems/data potentially affected, containment steps, and your plan for additional reporting.
- Exclude: Marketing language or non-factual speculation. Avoid categorical assurances beyond your evidence.
-
Internal Engineers
- Focus: Technical signals, hypotheses, and actions, but still careful with language that may be discoverable.
- Include: Clear incident timeline, evidentiary artifacts, containment and mitigations, and handoffs. Use precise technical terms supported by logs.
- Exclude: Legal conclusions or external commitments. Avoid inflammatory terms that imply certainty without backing data.
-
Public Statements (Press/Social)
- Focus: Calm, clarity, and consistency with what customers have been told.
- Include: Plain-language status, acknowledgment of impact, steps to restore service, and the next update time.
- Exclude: Detailed technical content or promises that box you in. Avoid blame and speculation.
Using modular templates helps ensure that while the tone and detail differ, the underlying facts remain aligned across channels. This consistency is critical for preserving trust.
4) Decision Tree and Micro-Drafts: How to Think Before You Write
A simple decision tree helps you avoid premature conclusions and keep your message tight and compliant. Ask these four questions in order before drafting:
1) What do we know? Enumerate confirmed facts only. Time-stamp them. Distinguish “observed symptoms” from “suspected causes.” 2) Who is affected? State the scope as currently understood. If unknown, say that the scope is under investigation and give the time for the next update. 3) What is our legal/regulatory posture? Confirm whether specific definitions are triggered. If not, avoid using regulated terms. Align with legal counsel on wording and timelines. 4) What can we safely promise now? Commit only to actions within your control: investigation, containment, mitigations, and update cadence. Avoid promising outcomes or timelines unless you have high confidence and internal agreement.
When you turn these answers into micro-drafts, follow a simple structure:
- Opening: State the current status in neutral terms and include a time reference.
- Impact: Describe who is affected and how. Use measurable language if possible.
- Actions: List what you are doing now to investigate or mitigate. Keep it factual.
- Uncertainty: Acknowledge what is not yet known. Avoid guessing.
- Next steps: Provide the time of the next update and any immediate steps stakeholders should take.
Notice what is missing: blame, promises you cannot guarantee, and legal conclusions that you are not ready to make. By repeatedly following this structure, you set clear expectations and maintain credibility.
Practical Guardrails: Phrase Banks and Red-Flag Lists
When an incident is live, speed matters. Pre-approved phrase banks and red-flag lists let teams communicate quickly without waiting for ad hoc legal review. A good phrase bank provides neutral, time-bound sentences for common needs, such as acknowledging an availability issue, stating investigative status, or committing to a next update. A red-flag list highlights words and phrases that should be avoided or require legal review.
Benefits of pre-approval include:
- Faster response: Teams can publish initial updates quickly, reducing anxiety and rumor.
- Consistency: All audiences receive messages that align with your legal and regulatory posture.
- Reduced rework: Fewer cycles with legal and PR during the incident, because the language is already vetted.
- Lower risk: Standardized wording minimizes accidental admissions, promises, or misinformation.
Maintain your phrase bank and red-flag list as living documents. After each incident, update them with lessons learned. Train your teams to use them during drills so that, during a real event, the right language is second nature.
Putting It All Together: Preserve Availability and Trust
Effective security updates are built on discipline: separate availability incidents from security breaches, speak only to what is known, match detail to the audience, and use vetted language. This approach does not hide information; it ensures accuracy and clarity. You communicate respect for your stakeholders by being precise and consistent. You protect your organization by avoiding terms that create unnecessary legal exposure or expectations you cannot meet.
When you do these things well, two outcomes follow. First, availability is preserved through calm, coordinated response—because your communication does not distract or derail technical recovery. Second, trust grows over time—because your stakeholders learn that when you speak, you speak carefully, promptly, and truthfully. That is the foundation of resilient incident communication.
- Always distinguish availability incidents (performance/uptime issues) from security breaches (confirmed unauthorized access); never use breach language without evidence.
- Match wording to evidence level: suspected, investigating, confirmed; state time-stamped facts, scope, actions, and next update, and avoid promises or speculation.
- Use green-light phrases (e.g., “as of [time],” “we are investigating,” “no evidence of X at this time”) and avoid red-flag terms that imply certainty, blame, or guarantees.
- Keep one factual backbone and adapt detail for each audience (customers, executives, regulators, engineers, public) to stay consistent, compliant, and trustworthy.
Example Sentences
- As of 13:20 UTC, we are investigating a service degradation affecting a subset of users; we have not observed evidence of unauthorized access at this time.
- We rolled back the latest deployment at 09:05 UTC to stabilize performance and will provide the next update by 09:45 UTC.
- Current indicators point to increased load on our database cluster; the scope of impact is under investigation and we are not assigning cause or fault.
- We have contained the affected component and are reviewing logs; no conclusions about data exposure will be made until forensics is complete.
- Some customers may experience intermittent timeouts; please retry after a few minutes while we work to restore availability.
Example Dialogue
Alex: The dashboard is timing out—should we say we've been breached?
Ben: Not yet. As of 14:10 UTC, we only know there's an availability issue; we haven't seen evidence of unauthorized access.
Alex: Got it. So we say we're investigating and give a time for the next update?
Ben: Exactly. Announce that we've rolled back the last change, are reviewing logs, and will update again by 14:40 UTC.
Alex: Should we promise it'll be fixed by then?
Ben: No promises—just commit to the update cadence and the steps we're taking right now.
Exercises
Multiple Choice
1. Which update best distinguishes an availability incident from a security breach during early triage?
- We were breached and customer data was stolen.
- As of 10:30 UTC, we are investigating elevated error rates affecting some users; we have not observed evidence of unauthorized access at this time.
- The vendor is at fault and we will restore service in 10 minutes.
- No data was affected, and the issue is fully resolved.
Show Answer & Explanation
Correct Answer: As of 10:30 UTC, we are investigating elevated error rates affecting some users; we have not observed evidence of unauthorized access at this time.
Explanation: This option uses time-stamped, neutral language, reports observed symptoms, and avoids asserting a breach without evidence—aligning with the lesson’s separation of availability vs. security and cautious phrasing.
2. Which phrase is a red-flag according to the framework and should be avoided without confirmation?
- We will provide the next update by 15:00 UTC.
- We are investigating potential causes and reviewing logs.
- We have confirmed a breach and exfiltration of data.
- As of 12:20 UTC, some customers may experience timeouts.
Show Answer & Explanation
Correct Answer: We have confirmed a breach and exfiltration of data.
Explanation: Declaring a confirmed breach and exfiltration is a regulated claim that triggers legal and regulatory obligations. The lesson warns against using such terms without validated evidence.
Fill in the Blanks
As of 08:55 UTC, we are reviewing logs related to intermittent timeouts; we have not observed evidence of ___ access at this time.
Show Answer & Explanation
Correct Answer: unauthorized
Explanation: The lesson emphasizes avoiding breach language unless confirmed; saying “unauthorized access” only in the negative acknowledges uncertainty without implying compromise.
Current indicators suggest a performance issue; the scope of impact is ___ investigation, and our next update will be at 11:30 UTC.
Show Answer & Explanation
Correct Answer: under
Explanation: “Under investigation” is a neutral, green-light phrase that communicates ongoing analysis without assigning fault or confirming a breach.
Error Correction
Incorrect: We were breached this morning because the network was slow, but no data was affected.
Show Correction & Explanation
Correct Sentence: As of this morning, we observed network slowness affecting availability; we have not observed evidence of unauthorized access at this time.
Explanation: The original sentence conflates an availability issue with a breach and makes an absolute claim about data. The correction separates availability from security and uses cautious, evidence-based language.
Incorrect: We guarantee service will be restored in 20 minutes and the vendor is responsible.
Show Correction & Explanation
Correct Sentence: We are working to restore service and will provide the next update in 20 minutes; cause analysis is in progress.
Explanation: The lesson advises against promises of outcomes and premature blame. The correction commits only to an update cadence and acknowledges ongoing investigation without assigning fault.