18/03/2014 22:16
It sounds like IT, not marketing! Data breach, identity protection, customer security – these are terms that never concerned marketers much. The breaches that retailers Target, Neiman Marcus, Zappos,...
14/03/2014 03:30
  By Michael Riley, Ben Elgin, Dune Lawrence, and Carol Matlack  March 13, 2014 The biggest retail hack in U.S. history wasn’t particularly inventive, nor did it...
02/03/2014 06:54
New risks and high-profile data breaches have more companies looking to buy cyber liability coverage in a market that's giving them more bang for their cyber buck.   On Dec. 23, the last...
01/03/2014 20:40
  (Reuters) - Boeing Co (BA.N) on Wednesday unveiled a smartphone that appears to come straight from a James Bond spy movie. In addition to encrypting calls, any attempt to open the...
27/02/2014 04:46
Joe Raedle/Getty Images Target...
23/02/2014 20:09
The widespread security breach reportedly compromised 40 million credit and debit cards, which are costing banks a pretty penny to reissue. Not only were as many as 110 million Target customers...
16/02/2014 11:34
German Chancellor Angela Merkel is proposing building up a European communications network to help improve data protection. It would avoid emails and other data automatically passing through the...
14/02/2014 06:19
By Mark WardTechnology correspondent, BBC NewsIt is not clear how the data for the site went astray Tesco has deactivated some customers' net accounts after their login names and passwords...
09/02/2014 14:08
Barclays said it would "contact and advise" all affected customers   Investigations have been launched after a report that thousands of confidential files with Barclays Bank customers details...
08/02/2014 16:26
  Mastercard Corporate Intelligence is the WSJ’s business news blog, with a lively take on the day’s most important business...
04/02/2014 07:39
(Reuters) - A credit card data breach has been detected that exposed guests at certain Marriott, Holiday Inn, Sheraton and other hotel properties to theft, hotel management firm White Lodging...
29/01/2014 20:03
Coca-Cola has admitted falling prey to bizarre slow-motion data breach in which an employee apparently stole dozens of laptops over several years containing the sensitive data of 74,000 people...
<< 69 | 70 | 71 | 72 | 73 >>




Cyber Rescue Ltd.

Incident Response

 The First 24 Hours Checklist 


Panicking won’t get you anywhere once you’ve discovered a data breach. Accept that it’s happened and immediately contact your legal counsel for guidance on initiating these 10 critical steps:

  • Record the date and time when the breach was discovered, as well as the current date and time when response efforts begin, i.e. when someone on the response team is alerted to the breach.

  • Alert and activate everyone on the response team, including external resources, to begin executing your preparedness plans.

  • Secure the premises around the area where the data breach occurred to help preserve evidence.

  • Stop additional data loss. Take affected machines offline but do not turn them off or start probing into the computer until your forensics team arrives.

  • Document everything known thus far about the breach: Who discovered it, who reported it, to whom was it reported, who else knows about it, what type of breach occurred, what was stolen, how was it stolen, what systems are affected, what devices are missing, etc.

  • Interview those involved in discovering the breach and anyone else who may know about it. Document your investigation.

  • Review protocols regarding disseminating information about the breach for everyone involved in this early stage.

  • Assess priorities and risks based on what you know about the breach.

  • Bring in your forensics firm to begin an in-depth investigation.

  • Notify law enforcement, if needed, after consulting with legal counsel and upper management

Source: Experian Data Breach Guide

  Bachelor's in Cybercrime


CEO & C-Level Executives 

Role in 

Data Breach Management

click here