Damage Control After a Security Breach
Data breaches are the stuff of nightmares, but if you want to manage your IT environment effectively, you have to be prepared for the worst. Most companies find out their data has leaked when a third party reports it, but according to the 2010 Verizon Data Breach Investigations Report, most companies have evidence of the break in their log files. Experts suggest that you pull transaction logs, OS records, and authentication logs for the servers or devices that were affected. Pinpointing the anomalies will help you plug the hole, investigate the crime, figure out what was stolen, and prevent it from happening again.
Modernizing Authentication — What It Takes to Transform Secure Access