Guest Column | November 10, 2015

What To Focus On After A Breach: Five Key Questions

By Pedro Abreu, Chief Strategy Officer, ForeScout Technologies, Inc.

The Identity Theft Resource Center reports that as of late October, there have been 629 data breaches this year, exposing nearly 176 million records. That’s about two breaches per day, with many more attempted. A company’s data and reputation are at stake, and managed services providers (MSPs) and their customers may share that natural human desire to know who was responsible for a data breach. However, you can waste a lot of time and energy in pursuit of “whodunit.” These days, there are more important questions than who’s to blame when it comes to network breaches and data theft.

When a system is breached, either yours or a customer’s, here are five questions to ask that are more important than who was responsible:

  • “How did the bad guys get in?” If security managers have a real-time view of every connected device, every authorized user and every malware link clicked on, they have a better chance of pinpointing the incoming threats capable of causing damage. For this reason, network visibility is essential.

Please log in or register below to read the full article.

access the Guest Column!

Get unlimited access to:

Trend and Thought Leadership Articles
Case Studies & White Papers
Extensive Product Database
Members-Only Premium Content
Welcome Back! Please Log In to Continue. X

Enter your credentials below to log in. Not yet a member of VAR Insights? Subscribe today.

Subscribe to VAR Insights X

Please enter your email address and create a password to access the full content, Or log in to your account to continue.

or

Subscribe to VAR Insights