Five Critical Steps to Handling a Security Breach

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Critical Steps to Handling a Security Breach-4 Next

Disinfect

Now that the infection has been quarantined, it's time to get out your rubber gloves. Compare pre-infection and post-infection backups. Start with the most critical systems first. Remember that a network breach is considered a crime, so try not to destroy valuable evidence.

Tip: Make safe, stable copies of any illegal content and store on an isolated system, preventing accidental re-infection. Consult with your corporate legal counsel and ensure that you have the most up to date and accurate advice.

We have long since passed an era when 100 percent prevention of security breaches was even remotely possible, especially when it only takes a single, seemingly harmless activity — such as an employee clicking a link, using an insecure Wi-Fi connection, or downloading a corrupted software update — to unleash a full-scale infection.

This, however, doesn’t mean your enterprise is helpless and vulnerable. On the contrary, you can dramatically improve your ability to avoid disaster and mitigate damage if you take the right actions. In this slideshow, Seculert outlines five critical steps for handling a security breach.

Seculert provides an integrated platform that identifies resident, active threats that have evaded existing perimeter defenses and breach detection systems.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.