Wednesday, June 20, 2007

The do's and don'ts of data breaches

Network World

Networking Technology Update




Networking Technology Update, 06/20/07

The do’s and don’ts of data breaches

* How security professionals can lessen the impact

By Cara Garretson

VoIP: Lessons from Early Adopters

Experts say VoIP isnt a magic wand that will solve all of an organizations communications challenges right out of the box. Learn why VoIP may not produce expected savings and productivity gains, and other lessons from early adopters.

Click Here to Watch

Believe it or not, a data breach isn’t the worst thing that could happen to your organization. Reacting poorly to the incident could be, however.

Experts agree every organization that stores personal or financial information about customers, partners or employees, or that has intellectual property in electronic form should be considered a target — that’s arguably just about every organization doing business. Instead of assuming data breaches happen only to large financial services companies or retailers, companies large and small in every industry should be prepared to react to help minimize damage and quickly restore customer confidence, they say.

“It makes all the difference in the world” if a company is prepared to respond to a data breach or other type of cyberintrusion, says Tom Bowers, managing director of Security Constructs, a security services firm based in Philadelphia.

Here is a list of what companies should do and what they should avoid doing in the case of a data breach, besides putting a computer-emergency response team in place to react to such incidents. The list is compiled from interviews with consultants and security experts who have had to deal with these incidents or who have been called in to help companies immediately following an attack.

Check out that list here.

And to learn how to create a computer-emergency response team by clicking here.

TODAY'S MOST-READ STORIES:

1. 'Italian job' Web attack hits 10K sites
2. The case of the 500-mile e-mail
3. Pressure's on IBM to forgive millions in IT debt
4. Linux Foundation: Microsoft won't sue
5. The dos and don’ts of data breaches
6. Feds choose 10 vendors to secure mobile data
7. Zenoss Core wins test of open source tools
8. Top 15 USB geek gadgets
9. 10 reasons why it’s good and bad to be HP
10. Juniper feels growing pains

MOST-READ REVIEW:
Open source management-tool alternatives hit the mark


Contact the author:
Network World Senior Editor Cara Garretson can be reached at: cara_garretson@nww.com

BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: networking.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments: