Are You Ready? How to Prepare for a Security Incident

Posted: 2nd Sep 2022

When an incident occurs, the incident investigator will collect data from numerous sources within the organisation to determine whether or not there is a security incident. The investigator will request audit logs, transaction logs, intrusion logs, connection logs, system performance records and above all, User activity logs from firewalls, intrusion detection/prevention systems, routers, switches, servers, desktops, mainframes, business applications, databases, anti-virus, VPNs and any other system with a CPU.

View Full Article

Related Articles

Popular Articles

Pat Opet, the global chief information security officer at JPMorganChase, says three trends today pl...
The frequency and cost of cyberattacks on SMBs accentuates the sometimes underappreciated fact tha...
Discover the actions you can take to protect your online presence from cybersecurity threats in this...
Media and entertainment organizations are among the world’s biggest consumers of data storag...