Damage Control After a Security Breach

By eweek  |  Posted 2011-01-31 Email

Data breaches are the stuff of nightmares, but if you want to manage your IT environment effectively, you have to be prepared for the worst. Most companies find out their data has leaked when a third party reports it, but according to the 2010 Verizon Data Breach Investigations Report, most companies have evidence of the break in their log files. Experts suggest that you pull transaction logs, OS records, and authentication logs for the servers or devices that were affected. Pinpointing the anomalies will help you plug the hole, investigate the crime, figure out what was stolen, and prevent it from happening again.

Sponsor Videos
Channel Insider
CIO Insight

Submit a Comment

Loading Comments...
Rocket Fuel