E-Investigation's Releases a Case Study on Data Breach and Why Incident Response is So Important

E-Investigations, a Houston, Texas based computer forensics firm, finds that a data breach can happen at any time and under the most secure conditions. In today's environment, if a business is not actively protecting sensitive customer, proprietary, and employee data, they are at risk.

  • Share on TwitterShare on FacebookShare on Google+Share on LinkedInEmail a friend
E-Investigations logo: "Computer Forensic Experts"

E-Investigations "Digital Forensic Experts"

Gary Huestis, Director of Digital Investigations at E-Investigations stated that "preparing an Incident Response Plan will not always prevent a data breach, but it will help minimize losses if one occurs".

Houston, Texas (PRWEB) April 29, 2013

E-Investigations, a Houston, Texas based computer forensics firm, finds that a data breach can happen at any time and under the most secure conditions. In today's environment, if a business is not actively protecting sensitive customer, proprietary, and employee data, they are at risk. Most businesses do not think about an Incident Response Plan until a data breach has been detected, which can be days or even months after a breach has occurred.

E-Investigations had a recent case involving a former employee that gained access to a former employer's computer system through a backdoor that he installed before being terminated. The former employee used this backdoor to generate fake email from the owner of the company and several other employees and sensitive financial documents were also accessed. Unfortunately, the data breach was not discovered until the company employed E-Investigations to implement an Incident Response Plan to examine the computers and company server and stop the breach. E-Investigation's innovative approach to Incident Response during a data breach or a suspected data breach can have a huge impact on data loss, proprietary information leaks and minimizing the financial impact of a data breach. The recovery costs to businesses as a result of a data breach are staggering at more than $8 billion in 2012.

Any company that has a presence on the internet or communicates via the internet should develop an Incident Response Plan in the event of a data breach. The Online Trust Alliance has released a helpful guide to develop an Incident Response Plan     and tips on securing company data.

Gary Huestis, Director of Digital Forensics at E-Investigations stated that "preparing an Incident Response Plan will not always prevent a data breach, but it will help minimize losses if one occurs". Mr. Huestis went on to say "that companies need to protect their customers' personal information from theft that can hurt customers and harm the business's reputation”.

OTA’s analysis of more than 1,470 data loss incidents worldwide tracked by the Open Security Foundation reveals that an astounding 242.6 million records were exposed in 2012, yet more than 97% of the incidents could have been avoided by implementing simple steps and following best practices and internal controls. While businesses typically focus on external threats, 26% of the reported breaches were the result of employee threats or accidental disclosures, indicating a need for more internal controls and employee training.

As society continues to become tethered to mobile devices which collect greater amounts of data including unique identifiers and location data, users are mostly unaware of what data is being collected, how it is being used and who has access to it. Increasingly data incidents and identity theft are occurring through accidental device loss and increased targeting by cybercriminals. E-Investigation's specializes in analyzing and securing all types of digital devices, from iPhones and Androids to iPads and tablets.

E-Investigations has the tools and experience to perform investigations on computers, tablets ans Smartphones including logical, physical, file system and password extraction of data from digital devices. By the incorporating the latest hardware and software technologies, E-Investigations has one of the most thorough capabilities for computer and mobile device investigations in the industry – with the ability to image thousands of computers, tablets, mobile phones, smartphones and portable GPS devices, and all major mobile OS: iOS, Android, BlackBerry, Nokia, Symbian, Windows Mobile and Palm.

E-Investigation's Computer Forensic Investigators follow the trail and decipher the information regardless of whether the evidence is digital, such as electronically stored information found on computers, tablets, mobile phones or other devices or if the investigation requires traditional private investigative services. E-Investigations' tools and techniques include surveillance, undercover work and detailed record searches. The final product helps our clients gain a deeper understanding of what has happened or what is occurring. The gained clarity and discovery of truth allows our clients to quickly respond and recover.

Gary Huestis is the Director of Digital Forensics at E-Investigations. Mr. Huestis is an EnCase certified examiner and a licensed private investigator.

About E-Investigations:
http://www.einvestigations.com

Call us toll-free at 877-305-4935


Contact

Follow us on: Contact's Twitter