TechNet Magazine has published a good article outlining the measures that need to be taken in response to a computer security breach. See how each of the steps including post-mortem, response, notification, security remediation, and follow-up need to be conducted in a calm and effective manner...
↧