dcsimg
 
 

DPI Scrambles After Credit-Card Theft

By Larry Dignan  |  Posted 2003-03-06 Email Print this article Print
 
 
 
 
 
 

"Security by obscurity" didn't work for one credit card processor: An "unauthorized outside party" ran off with credit card data anyway.

What You Should Do">

Hack Prevention

  1. Think ahead. Establish clear policies in case of an intrusion and create an emergency response team.
  2. Find your footprint. Create a clear map of your hardware, software and files so you know what your network looks like in a normal state. It will help you see what changed in the event of a hack.
  3. Contact allies. Touch base with law enforcement before an emergency as well as immediately after a hack.
  4. Contain the damage. If hit, disconnect the compromised system from the network.
  5. Rebuild, rearchitect. As you work through recovery, consider a different architecture to prevent future attacks.


<123
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.

By submitting your information, you agree that baselinemag.com may send you Baselinemag offers via email, phone and text message, as well as email offers about other products and services that Baselinemag believes may be of interest to you. Baselinemag will process your information in accordance with the Quinstreet Privacy Policy.

Click for a full list of Newsletterssubmit