New York, NY, September 08, 2011 --(PR.com
)-- The aftermath of a successful data breach can have far reaching consequences. Not only must the immediate damage and/or losses be considered, which can be catastrophic enough, but the potent doses of caustic toxins a successful breach can inject into formerly healthy relationships with clients, partners and vendors must also be taken into account. It is often this critical aspect of data breaches that can ultimately prove to be the most difficult to repair. Global Digital Forensics (GDF) has the experience and expertise to help you survive this potentially lethal elixir.
In a recent study called 'The Leaking Vault 2011', released in August by the Digital Forensics Association - the largest study of its kind conducted to date - 3,765 publicly disclosed data intrusion incidents from 2005 through 2010 were analyzed. The findings should move the DEFCON peg up a few notches for any organization maintaining confidential Electronically Stored Information (ESI). 806.2 million “known” records were compromised during that span, accounting for $156 billion in damages to the companies that directly experienced the breaches. When averaged out, the numbers really start to sink in; 388,000 records compromised a day, or 15,000 an hour … for the last six years.
When asked to weigh in on the study, Joseph Caruso, CEO/CTO of Global Digital Forensics, had this to say, “While these numbers paint a telling picture about the magnitude and scope of data breaches over the last six years, they only tell a portion of the story. When a breach occurs, it’s like an invasive species has been introduced into the organizational environment that affects the entire food chain. When the main source of sustenance is preyed upon, the clients, even the ones not directly targeted may try to migrate en masse from the perceived threat, and when that first and most important domino in the food chain falls, the bigger fish, partners and vendors, will start looking elsewhere for new food sources as well, leaving the organization incapable of stopping the cascading collapse.”
But there are steps Global Digital Forensics can help you take to fortify this delicate cyber-ecosystem. Some of these include:
1) Identifying threat vectors and cyber policy shortcomings - Because every organization is unique, a one size fits all approach is very rarely successful. In one situation laptops and insiders may be the highest threat vector, in another it may be outsiders or removable media. GDF will use a proven variety of methods to expose the most likely threat vectors and weaknesses in internal cyber policies. With this valuable information, detailed reports with remediation recommendations will be generated.
2) Data Flow Mapping – Many organizations have certain system areas containing confidential ESI locked down like Ft. Knox, but there are many paths and forms data can take in its lifespan. Cyber security can inherently not exist if an organization doesn’t know where every bit of data has traveled and who has accessed it, from conception to disposal. GDF’s detailed Data Flow Mapping will uncover the vulnerable points and offer recommendations to fortify those vulnerabilities.
3) Penetration Testing – Compared to IT security personnel, hackers have it easy. While those tasked with protecting data have to plug a million holes, a hacker only needs to find one. A penetration test conducted by GDF serves to expose the weaknesses a real-world hacker may find by attempting to hack through an organization’s security using the same exploits, techniques and strategies an outside hacker would use to gain unauthorized access to data. Detailed reports and remediation recommendations will then be generated so the vulnerabilities can be corrected.
4) Emergency Intrusion Incident Response Teams - In the ever evolving cyber landscape, there is unfortunately no such thing as perfect security. Like a mythical hydra, it seems for every head (exploit) that’s cut off two grow back. So even the most advanced cyber security measures may eventually be compromised. GDF has a network of emergency responders strategically located, both nationally and globally, to respond to an intrusion in a matter of hours. By setting up a Service Level Agreement (SLA) with GDF in advance, the response procedures and policy will already be laid out, and the time-critical task of mitigating damage and loss due to a data breach will be substantially improved. Having GDF signed on as emergency incident responders also helps satisfy certain regulatory compliance issues.
It is proven time again that how an organization responds to a data breach will greatly affect client trust and the public perception of an organization’s integrity. For more details about how GDF can help improve your cyber security posture and/or minimize the impact of a compromise, call GDF toll free at (800) 868-8189, or visit www.globaldigitalforensics.com