Crime and retribution

The presence on the internet of those with malicious intentions has been the subject of Hollywood blockbusters, so it is fair to assume that most business leaders are aware of the threat. But perhaps less well understood is how the business can respond if its IT security is breached…If the police are to catch and prosecute the perpetrators, then IT needs to think about preserving the evidence. Electronic evidence needs to be treated with care. It is important that the integrity of the data is preserved and that it can be demonstrated that no changes have been made. It is essential that there are audit trails logging any access to systems and changes made…

More (

Leave a Comment