Six Steps for Dealing with a High-Level Data Breach

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9
Previous Next

Click through for six steps organizations should take when faced with a data breach, as identified by Anthony DiBello, strategic partnerships manager, Guidance Software.

Sue PorembaThe Department of Energy was hacked. Again. It is the second time this year that the DOE was the victim of a breach. The breach took place in, and it is believed that the personally identifiable information (PII) of 14,000 present and former employees was potentially compromised.

Defense contractor Northrop Grumman recently announced that it, too, suffered a similar breach.

In both cases, because of the type of information affected, the hackers may have been doing little more than data mining for valuable-on-the-black-market PII. Or it could be the hackers were looking for more, like the ability to access data involving the critical infrastructure or national security stored on the organizations’ networks. We don’t know, and we won’t know, as Anthony DiBello, strategic partnerships manager, Guidance Software, pointed out to Sue Marquette Poremba in an email, without a complete forensic analysis of the compromised systems. He went on to say:

When incidents like this happen, people are very eager to get their systems and machines back online and working. This may cause serious loss to the forensic artifacts and the evidence to determine exactly what happened.

After a breach, DiBello added, an organization should take the time to learn what happened, and leverage the lessons learned to improve their systems. Otherwise, they may leave themselves vulnerable to another, similar attack. So DiBello provided the following tips on how to best manage breaches like this.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

security14-190x128.jpg Financial Sector Sees Cyber Incident Increase in February

In February 2015, Financials was the lone industry sector with cybercrime incidents above six-month averages. This is largely attributed to the massive breach at health insurer Anthem. ...  More >>

Security62-290x195 Seven Ways to Improve Cybersecurity Through Behavioral Analysis

No matter how advanced SIEM tools become, security pros must back up their findings with data rooted in the company's daily IT activities in order to glean valuable insights. ...  More >>

LogicalisSecurityBizEnabler0x Beyond Protection: Security as a Business Enabler

What if security tools could do more? What if they could enable the business by providing deeper visibility and a better understanding of how corporate compute resources are being used? ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date