What to Do When Your Security is Breached

Tim Wilson, Site Editor for DarkReading.com, has just posted a simple, no-nonsense article explaining how to develop an effective computer security intrusion response policy. A must read for all of you who are managing a network with no security policies in place.

Well, it’s finally happened. Despite all your efforts to stop both internal and external attackers, someone has penetrated your defenses and stolen or damaged your data. You’ve got a full-blown security incident on your hands. What are you going to do about it?

Read more

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.