search for: miyagi

Displaying 3 results from an estimated 3 matches for "miyagi".

2016 Jan 25
3
What to do when you've been hacked?
No, we haven't been hacked. ;) We have a prospective client who is asking us what our policy is in the event of unauthorized access. Obviously you fix the system(s) that have been compromised, but what steps do you take to mitigate the effects of a breach? What is industry best practice? So far, searches haven't produced anything that looks consistent, except maybe identity monitoring
2016 Jan 25
0
What to do when you've been hacked?
On Jan 25, 2016, at 11:04 AM, Benjamin Smith <lists at benjamindsmith.com> wrote: > > We have a prospective client who is asking us what our policy is in the event > of unauthorized access. Tell them you use the Mr. Miyagi defense: ?Don?t get hit.? Your prospective client sounds like they?re expecting someone to have established procedures to deal with breaches. You know who has established procedures? Organizations that see the same problems again and again. Selecting an information service provider based on whi...
2016 Jan 26
1
What to do when you've been hacked?
...nuary 25, 2016 11:56:19 AM Warren Young wrote: > On Jan 25, 2016, at 11:04 AM, Benjamin Smith <lists at benjamindsmith.com> wrote: > > We have a prospective client who is asking us what our policy is in the > > event of unauthorized access. > > Tell them you use the Mr. Miyagi defense: ?Don?t get hit.? > > Your prospective client sounds like they?re expecting someone to have > established procedures to deal with breaches. You know who has established > procedures? Organizations that see the same problems again and again. > > Selecting an information...