Re: [CentOS] What to do when you've been hacked?

2016-01-26 Thread James B. Byrne
On Mon, January 25, 2016 19:12, Benjamin Smith wrote: > > Which I'd consider "best practices" and we do them. > They are specifically asking about what to do *after* a > breach. Despite all the best practices in > place, there's *still* some risk. > If someone wants in to your network then they

Re: [CentOS] What to do when you've been hacked?

2016-01-25 Thread Valeri Galtsev
On Mon, January 25, 2016 6:12 pm, Benjamin Smith wrote: > On Monday, January 25, 2016 11:56:19 AM Warren Young wrote: >> On Jan 25, 2016, at 11:04 AM, Benjamin Smith >> And much more. > > Which I'd consider "best practices" and we do them. They are specifically > asking about what to do *after

Re: [CentOS] What to do when you've been hacked?

2016-01-25 Thread Benjamin Smith
On Monday, January 25, 2016 11:56:19 AM Warren Young wrote: > On Jan 25, 2016, at 11:04 AM, Benjamin Smith wrote: > > We have a prospective client who is asking us what our policy is in the > > event of unauthorized access. > > Tell them you use the Mr. Miyagi defense: “Don’t get hit.” > > Your

Re: [CentOS] What to do when you've been hacked?

2016-01-25 Thread Warren Young
On Jan 25, 2016, at 11:04 AM, Benjamin Smith wrote: > > We have a prospective client who is asking us what our policy is in the event > of unauthorized access. Tell them you use the Mr. Miyagi defense: “Don’t get hit.” Your prospective client sounds like they’re expecting someone to have esta

Re: [CentOS] What to do when you've been hacked?

2016-01-25 Thread Valeri Galtsev
On Mon, January 25, 2016 12:04 pm, Benjamin Smith wrote: > No, we haven't been hacked. ;) > We have a prospective client who is asking us what our policy is in the > event > of unauthorized access. Obviously you fix the system(s) that have been > compromised, but what steps do you take to mitigate

[CentOS] What to do when you've been hacked?

2016-01-25 Thread Benjamin Smith
No, we haven't been hacked. ;) We have a prospective client who is asking us what our policy is in the event of unauthorized access. Obviously you fix the system(s) that have been compromised, but what steps do you take to mitigate the effects of a breach? What is industry best practice? So far