Enterprise Networking: Network Security Breaches: 10 Things to Do Immediately After

By Chris Preimesberger  |  Posted 2012-03-07 Print this article Print
Try Not to Fret Too Much: This is Happening To Everyone

Try Not to Fret Too Much: This is Happening To Everyone

Numerous studies show most large and midsize companies reported some type of data system attack in 2011. A majority of data security companies and industry analysts are predicting more frequent and higher-level attacks in 2012.
No enterprise is immune to data security breaches. Governments and corporations alike need to have contingency plans in place to perform network forensics once a breach occurs. Network security is mostly designed to prevent attacks, said Jay Botelho, director of product marketing at WildPackets, which makes network performance management, application, and voice over IP (VOIP) analysis products. "But attacks continue to happen-the press is full of documented breaches-and most victims don't have the right equipment or policies in place to properly analyze a compromise once it occurs," said Botelho. Networks are constantly under attack, whether it's the casual attention-seeker or a sophisticated and stealthy advanced persistent threat (APT). At this point, network administrators need more than firewalls, intrusion detection system/intrusion prevention system (IDS/IPS) solutions, and data leak prevention software for protection. Only by supplementing these technologies with solutions that record every network "movement" and perform post-attack analysis are organizations better protected. The information in this slide show represents best practices for addressing what to do once a security breach happens. (Chris Preimesberger is Editor of Features and Analysis at eWEEK. Twitter: editingwhiz)
Chris Preimesberger Chris Preimesberger was named Editor-in-Chief of Features & Analysis at eWEEK in November 2011. Previously he served eWEEK as Senior Writer, covering a range of IT sectors that include data center systems, cloud computing, storage, virtualization, green IT, e-discovery and IT governance. His blog, Storage Station, is considered a go-to information source. Chris won a national Folio Award for magazine writing in November 2011 for a cover story on Salesforce.com and CEO-founder Marc Benioff, and he has served as a judge for the SIIA Codie Awards since 2005. In previous IT journalism, Chris was a founding editor of both IT Manager's Journal and DevX.com and was managing editor of Software Development magazine. His diverse resume also includes: sportswriter for the Los Angeles Daily News, covering NCAA and NBA basketball, television critic for the Palo Alto Times Tribune, and Sports Information Director at Stanford University. He has served as a correspondent for The Associated Press, covering Stanford and NCAA tournament basketball, since 1983. He has covered a number of major events, including the 1984 Democratic National Convention, a Presidential press conference at the White House in 1993, the Emmy Awards (three times), two Rose Bowls, the Fiesta Bowl, several NCAA men's and women's basketball tournaments, a Formula One Grand Prix auto race, a heavyweight boxing championship bout (Ali vs. Spinks, 1978), and the 1985 Super Bowl. A 1975 graduate of Pepperdine University in Malibu, Calif., Chris has won more than a dozen regional and national awards for his work. He and his wife, Rebecca, have four children and reside in Redwood City, Calif.Follow on Twitter: editingwhiz

Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters

Rocket Fuel