Finding the Cleanup Crew After a Messy Hack Attack


The New York Times says being hacked is like someone invading your home, and more than anything else, time is of the essence.

The goal is to determine quickly the “fingerprint” of the intrusion and its scope.

For example, how did the hacker break in, what did he take, when did he break in, and how can it be stopped?

In large-scale attacks, “the first thing a forensics team will do is try to get the hackers off the company’s network, which entails simultaneously plugging any security holes, removing any back doors into the company’s network that the intruders might have installed, and changing all the company’s passwords.”

But that’s a moot point if it’s not entirely removed, and if even just one compromised password is not updated, hackers may still have access.

As the Times article says, in the world of computer security the most dangerous breaches are the quiet ones, or the ones in which hackers actually leave no trace.


Get Private Wifi   Protect your personal information.
Get DataCompress   Cut your mobile data usage.

Elaine Rigoli

Elaine Rigoli is PRIVATE WiFi's manager of digital content strategy.

You may also like...