Breaches and Incident Response
When system administrators and business managers suspect a data breach, hack or intrusion of their IT system, a swift response is not only good business practice, it may be required by law. Many businesses today host or store information that can present significant liability if it is exposed: personal identity information, medical/HIPPA and other regulated records, and confidential customer information and data. Investigation of the breach must be immediate and thorough, as it will form the basis for any required reporting of the breach and serve to mitigate damages as swiftly as possible.
Outsider Hacks and Intrusions
Insider Access, Theft and Misuse of Data
Regulatory Response to Breaches