Data breaches happen all too frequently, with many high-profile companies suffering losses and reputational damage as a result. Putting preventive measures in place is essential, but so is having an effective plan for how to cope with a data breach if it happens to you. In this guide, we look at the best practice in dealing with a data breach. The guide includes examples of companies that have been hit by data breaches and how they have responded, as well as expert advice on how to respond to a data breach or cyber security incident.
1What to do after a breach-
Data breach response
A look at the best practice in dealing with a data breach once it's been discovered
There is a golden hour at the outset where a clear head and good planning can make or break any subsequent forensic investigation Continue Reading
Emily Dent, specialist in crisis PR, offers some advice to organisations that unexpectedly find themselves in the headlines Continue Reading
If you think your organisation hasn't suffered a network security breach in the past six months, you're just not looking closely enough, according to Eric Cole at RSA Conference 2015 Continue Reading
2Plan to deal with data breach-
Data breach prevention
How is the cyber security industry helping firms to protect themselves from data breaches, and what should companies be doing?
Businesses will increasingly be forced to adopt cloud-based security services to take care of the basics so they can focus on more complex threats Continue Reading
Five key things that boards need to do to stop their businesses leaking like sieves and potentially going to the wall Continue Reading
What can the board do to avoid having to answer embarrassing questions at the next shareholder meeting? Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
3Where does stolen data go?-
The dark web and hidden data economy
What happens to stolen data after a breach, and what are law enforcement authorities doing in response to this threat?
The dark web is a key conduit for the malware industry to refine and distribute its products and services, say security researchers Continue Reading
The cyber crime support industry is becoming increasingly commercialised, says a report by the European Cybercrime Centre Continue Reading
A joint EU/US operation on the DroidJack malware is the latest example of international collaboration between law enforcement officers directed at cyber crime Continue Reading
4Big companies are victims-
Data breaches – who’s been affected?
Many high-profile companies are being affected by data breaches - even those with a big cyber security budget are vulnerable
Discovery of a data breach at JD Wetherspoons comes hard on the heels of a breach at TalkTalk, underlining the importance of keeping customer data safe Continue Reading
TalkTalk has warned customers their personal data may have been compromised in the second cyber attack on the firm in 2015, with some data left unencrypted Continue Reading
A toymaker's database compromised by hackers reportedly included the personal details of more than 200,000 children worldwide Continue Reading