<img alt="dcsimg" id="dcsimg" width="1" height="1" src="//www.qsstats.com/dcs8krshw00000cpvecvkz0uc_4g4q/njs.gif?dcsuri=/index.php/c/a/Projects-Security/DPI-Scrambles-After-CreditCard-Theft/2&amp;WT.js=No&amp;WT.tv=10.4.1&amp;dcssip=www.baselinemag.com&amp;WT.qs_dlk=XthKEyZOL6UBhZxjAl8f6wAAAA4&amp;">

DPI Scrambles After Credit-Card Theft

By Larry Dignan Print this article Print

"Security by obscurity" didn't work for one credit card processor: An "unauthorized outside party" ran off with credit card data anyway.

What You Should Do">

Hack Prevention

  1. Think ahead. Establish clear policies in case of an intrusion and create an emergency response team.
  2. Find your footprint. Create a clear map of your hardware, software and files so you know what your network looks like in a normal state. It will help you see what changed in the event of a hack.
  3. Contact allies. Touch base with law enforcement before an emergency as well as immediately after a hack.
  4. Contain the damage. If hit, disconnect the compromised system from the network.
  5. Rebuild, rearchitect. As you work through recovery, consider a different architecture to prevent future attacks.

This article was originally published on 2003-03-06
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.