Five Critical Steps to Handling a Security Breach

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Critical Steps to Handling a Security Breach-5 Next

Develop a communication plan

Legally, you may need to disclose the attack, if not publicly, then at least to those potentially affected, e.g., customers, partners or other stakeholders. Decide if sharing information at this point is a necessary public relations move. There are professionals who specialize in the field of network security breaches, e.g., PR communications professionals and lawyers.

We have long since passed an era when 100 percent prevention of security breaches was even remotely possible, especially when it only takes a single, seemingly harmless activity — such as an employee clicking a link, using an insecure Wi-Fi connection, or downloading a corrupted software update — to unleash a full-scale infection.

This, however, doesn’t mean your enterprise is helpless and vulnerable. On the contrary, you can dramatically improve your ability to avoid disaster and mitigate damage if you take the right actions. In this slideshow, Seculert outlines five critical steps for handling a security breach.

Seculert provides an integrated platform that identifies resident, active threats that have evaded existing perimeter defenses and breach detection systems.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.