Damage Control After a Security Breach

 
 
By eweek  |  Posted 2011-01-31 Email
 
 
 
 
 
 
 
 
 

Data breaches are the stuff of nightmares, but if you want to manage your IT environment effectively, you have to be prepared for the worst. Most companies find out their data has leaked when a third party reports it, but according to the 2010 Verizon Data Breach Investigations Report, most companies have evidence of the break in their log files. Experts suggest that you pull transaction logs, OS records, and authentication logs for the servers or devices that were affected. Pinpointing the anomalies will help you plug the hole, investigate the crime, figure out what was stolen, and prevent it from happening again.


Baseline
Sponsor Videos
Channel Insider
CIO Insight
Newsbreak
eWeek
 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
 
 
Rocket Fuel