10/05/2014 19:23
When a data breach occurs and millions of users’ information is compromised, someone has to take the blame for it. Target Corp. CEO Gregg Steinhafel on Monday resigned from his...
30/04/2014 00:02
  The following is a roundup of healthcare data breaches reported in the last 30 days, beginning with the most recent: 1. Laptops Stolen from New York Podiatrist's Office Contained 6,475...
21/04/2014 17:05
Back to the Beginning: Moving Beyond Breaches There’s a saying in the cybersecurity industry that there are two types of businesses today: Those that have been breached and know it and those that...
19/04/2014 09:02
Bboard members should not expect a free pass. The reputation damage and soft costs from a data breach can be immeasurable. Board members can face liability, either for taking an action or...
30/03/2014 11:16
  Incidents of data theft are on the rise, as are the costs associated with them. A 2012 survey conducted by the National Cyber Security Alliance and McAfee found that one in...
25/03/2014 22:24
The new European Union data protection regulation to replace the outdated 1995 directive will not be finalised before May's European Parliament elections.  The council of ministers’ lawyer is...
23/03/2014 17:15
By Matt Egan Published March 20, 2014 FOXBusiness Investors cringe when a company they own, such as Target (TGT) or Las Vegas...
18/03/2014 22:16
It sounds like IT, not marketing! Data breach, identity protection, customer security – these are terms that never concerned marketers much. The breaches that retailers Target, Neiman Marcus, Zappos,...
14/03/2014 03:30
  By Michael Riley, Ben Elgin, Dune Lawrence, and Carol Matlack  March 13, 2014 The biggest retail hack in U.S. history wasn’t particularly inventive, nor did it...
02/03/2014 06:54
New risks and high-profile data breaches have more companies looking to buy cyber liability coverage in a market that's giving them more bang for their cyber buck.   On Dec. 23, the last...
01/03/2014 20:40
  (Reuters) - Boeing Co (BA.N) on Wednesday unveiled a smartphone that appears to come straight from a James Bond spy movie. In addition to encrypting calls, any attempt to open the...
27/02/2014 04:46
Joe Raedle/Getty Images Target...
23/02/2014 20:09
The widespread security breach reportedly compromised 40 million credit and debit cards, which are costing banks a pretty penny to reissue. Not only were as many as 110 million Target customers...
16/02/2014 11:34
German Chancellor Angela Merkel is proposing building up a European communications network to help improve data protection. It would avoid emails and other data automatically passing through the...
14/02/2014 06:19
By Mark WardTechnology correspondent, BBC NewsIt is not clear how the data for the site went astray Tesco has deactivated some customers' net accounts after their login names and passwords...
<< 53 | 54 | 55 | 56 | 57 >>



Cyber Rescue Ltd.

Image result for Security breach

 The First 24 Hours Checklist 


Panicking won’t get you anywhere once you’ve discovered a data breach. Accept that it’s happened and immediately contact your legal counsel for guidance on initiating these 10 critical steps:

  • Record the date and time when the breach was discovered, as well as the current date and time when response efforts begin, i.e. when someone on the response team is alerted to the breach.

  • Alert and activate everyone on the response team, including external resources, to begin executing your preparedness plans.

  • Secure the premises around the area where the data breach occurred to help preserve evidence.

  • Stop additional data loss. Take affected machines offline but do not turn them off or start probing into the computer until your forensics team arrives.

  • Document everything known thus far about the breach: Who discovered it, who reported it, to whom was it reported, who else knows about it, what type of breach occurred, what was stolen, how was it stolen, what systems are affected, what devices are missing, etc.

  • Interview those involved in discovering the breach and anyone else who may know about it. Document your investigation.

  • Review protocols regarding disseminating information about the breach for everyone involved in this early stage.

  • Assess priorities and risks based on what you know about the breach.

  • Bring in your forensics firm to begin an in-depth investigation.

  • Notify law enforcement, if needed, after consulting with legal counsel and upper management

Source: Experian Data Breach Guide



CEO & C-Level Executives 

Role in 

Data Breach Management

click here