Tiversa Contact Us   |   Register  
  Solutions Company Learning Center

Have You Experienced
a Breach?




News and Events




Home
  »   4 Step Guide


       
       
 


4 Step Guide

Data breaches of any kind can present a number of challenges
to your organization. Loss of sensitive data can cause revenue
loss, brand damage, costly breach notification and credit monitoring,
litigation and more.



> Intelligence Newsletter
> Our Solutions
> Request Executive Briefing
> Contact Us
 
 
    When a P2P file disclosure occurs, organizations should take the following actions:
 
 
STEP 1
Identify

  STEP 2
Remediate
  STEP 3
Notify
  STEP 4
Document
Tiversa can assist you in confirming the offending computer or source (it may or may not be the computer that you have identified) and identify any additional files that might have been disclosed.

Important:
Tiversa will also perform a Global Spread Analysis (GSA) to identify any additional sources that may have acquired the files and are re-sharing them on the P2P networks.

  Once the comprimised files and disclosure sources are identified,
timeliness is critical in correcting the problem as spreading is imminent on such viral networks. Work diligently to shut down the offending computer/source. Tiversa not only assists in the necessary remediation efforts,
but continues to monitor P2P networks to ensure file removal was properly completed & that files do not re-appear.
  Unless file remediation occurred within hours of the initial disclosure and no file spread is confirmed, take any notification steps required by state/industry regulatory bodies based on the severity of the information (e.g. social security numbers, etc). Provide services (i.e. credit monitoring, fraud alerts, etc.) to affected individuals.

Important:
Choosing an identity theft service that offers internet monitoring protection including protection for social and file-sharing networks is crucial in mitigating exposed individuals’ chances of becoming a victim of identity theft, financial or medical fraud.







  It is important to now document all steps taken to address both this incident and to prevent others from occurring in the future. This documentation can be used to support future legal defense actions and also to update your policies, which should be continually evaluated. Some regulatory bodies even require documentation.
 




 



 
Tiversa Solutions

  Company Resources  
Enterprise
Corporate Breach Protection
P2P Incident Response
Web Monitoring Services

Fraud Protection Services


SMB
SMB Breach Protection
P2P Incident Response



  Federal
Federal Breach Protection
P2P Incident Response
Federal Intelligence Services

Advisory Services

Individual
Personal Protection

  Company Overview
Advisory Board
Investors
Contact Us

News & Events
Learning Center
Key Concepts
FAQ/Misconceptions
The Extended Enterprise
Tiversa Research