Checklist: 11 things to do after a hack


We preach quite a bit on this site about how to prevent security breaches, and hopefully you take it to heart and play an active role in hardening your systems. But sometimes even that ounce of prevention and pound of cure isn't enough to defend against a predator and the resulting penetration of your protections can be a mind-boggling experience.

Where do you begin? Here's a brief list of some steps to take "post-hack" to ensure you have the best chance of determining who did what and how it was done. Checklist: 11 things to do after a hack

Linked by shanmuga Friday, 27th January 2006 12:02AM