Chapter 13

Recovering from a Security Breach

IN THIS CHAPTER

Bullet Surviving when your own computer has been hacked

Bullet Recovering when someone has stolen your data from a third-party provider

OMG! It happened.

You’ve discovered that you’ve suffered a data breach.

Now what?

Read this chapter, which discusses how to respond in these types of situations.

An Ounce of Prevention Is Worth Many Tons of Response

Remember When it comes to recovering from a security breach, there simply is no substitute for adequate preparation. Simply put, no amount of post-breach expert actions can deliver the same level of protection as proper pre-breach prevention.

If you follow the various techniques described throughout this book about how to protect your electronic assets, you’re likely to be in far better shape to recover from a breach than if you did not. Of course, preparation not only helps you reduce the risks of suffering a breach in the first place, but can also help you recover and help ensure that you can detect a breach if one occurs. Without proper preparation, you may not even be able to determine that a breach occurred, never mind contain the attack and stop it. (If you’re unsure whether you’ve suffered ...

Get Cybersecurity For Dummies, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.