What To Focus On After A Breach: Five Key Questions
By Pedro Abreu, Chief Strategy Officer, ForeScout Technologies, Inc.
The Identity Theft Resource Center reports that as of late October, there have been 629 data breaches this year, exposing nearly 176 million records. That’s about two breaches per day, with many more attempted. A company’s data and reputation are at stake, and managed services providers (MSPs) and their customers may share that natural human desire to know who was responsible for a data breach. However, you can waste a lot of time and energy in pursuit of “whodunit.” These days, there are more important questions than who’s to blame when it comes to network breaches and data theft.
When a system is breached, either yours or a customer’s, here are five questions to ask that are more important than who was responsible:
- “How did the bad guys get in?” If security managers have a real-time view of every connected device, every authorized user and every malware link clicked on, they have a better chance of pinpointing the incoming threats capable of causing damage. For this reason, network visibility is essential.
Please log in or register below to read the full article.
Get unlimited access to:
Enter your credentials below to log in. Not yet a member of VAR Insights? Subscribe today.