Part 2 of a series: More tips to stymie cyber bad guys

In the event of a breach, take three actions: 1. prioritize data preservation (“it’s like a crime scene”) 2. forestall any restoration until the forensic investigation has been completed and 3. assess the status of your backup

To read this article, you need to sign in.

You should only be asked to sign in once. Not the case? Click here

New to Regulatory Compliance Watch?

Register now to read this article and more for free.