The phone rings. You answer it and the rattled voice on the other end says, “We think there has been a breach.” What is your first thought about what to do?

A recent joint advisory issued by Australia, Canada, New Zealand, the United Kingdom and the United States highlights technical approaches to uncovering malicious activity and includes best-practice mitigation steps. The advisory’s goal is to help organizations improve incident response. That starts with the collection of relevant data: event logs, browser history files, evidence of listening ports, historical dates of when file folders and files were created, and so on.

To read this article in full, please click here

You May Also Like

Ransomware attack disrupts all systems of a prestigious university

Earlier this week, executives at the Autonomous University of Barcelona, in Spain…

Attention CEOs: No news can be good news when investigating a breach

David Estlick, chief information security officer of Chipotle Mexican Grill joined James…

India relaxes cyber security incidents reporting rules and says new rules apply to MNCs

Cybersecurity agencies in India are slightly relaxing their controversial and complex requirements…

Hackers attack cryptocurrency exchange platform: over 1.9 million users affected

A hacking group self-called VNDCIO has been credited with a devastating cyberattack…