On Mon, January 25, 2016 19:12, Benjamin Smith wrote:
>
> Which I'd consider "best practices" and we do them.
> They are specifically asking about what to do *after* a
> breach. Despite all the best practices in
> place, there's *still* some risk.
>
If someone wants in to your network then they
On Mon, January 25, 2016 6:12 pm, Benjamin Smith wrote:
> On Monday, January 25, 2016 11:56:19 AM Warren Young wrote:
>> On Jan 25, 2016, at 11:04 AM, Benjamin Smith
>> And much more.
>
> Which I'd consider "best practices" and we do them. They are specifically
> asking about what to do *after
On Monday, January 25, 2016 11:56:19 AM Warren Young wrote:
> On Jan 25, 2016, at 11:04 AM, Benjamin Smith
wrote:
> > We have a prospective client who is asking us what our policy is in the
> > event of unauthorized access.
>
> Tell them you use the Mr. Miyagi defense: “Don’t get hit.”
>
> Your
On Jan 25, 2016, at 11:04 AM, Benjamin Smith wrote:
>
> We have a prospective client who is asking us what our policy is in the event
> of unauthorized access.
Tell them you use the Mr. Miyagi defense: “Don’t get hit.”
Your prospective client sounds like they’re expecting someone to have
esta
On Mon, January 25, 2016 12:04 pm, Benjamin Smith wrote:
> No, we haven't been hacked. ;)
> We have a prospective client who is asking us what our policy is in the
> event
> of unauthorized access. Obviously you fix the system(s) that have been
> compromised, but what steps do you take to mitigate
No, we haven't been hacked. ;)
We have a prospective client who is asking us what our policy is in the event
of unauthorized access. Obviously you fix the system(s) that have been
compromised, but what steps do you take to mitigate the effects of a breach?
What is industry best practice? So far
6 matches
Mail list logo