A number of different surveys have revealed just how vulnerable and unprepared organizations are to various computer abuse scenarios and their consequences.
CDI's Breach Scan is a highly specialized service that blends the firm's computer forensic expertise with its forensic auditing skills to help management respond to and assess the consequences of network intrusions, data compromises, unauthorized use and mitigation of legal action.
In a 2014 Ponemon survey of over 1,000 corporate security professionals 55 percent lack adequate tools to determine the cause of a security attack and that 43 percent lacked adequate skills or training to determine the root cause of an attack. In addition, 38 percent would take the at least a year to determine the root cause while 41 percent would never know the root cause of the attack.
Breach Scan confirms whether there has been a network intrusion and determine if protected data like Personally Identifiable Information (PII), Protected Health Information (PHI), or Controlled Unclassified Information (CUI) has been compromised within the time required to make a self reporting determination.
In a 2009 Ponemon survey of about 1,000 former employees 60 percent admitted to taking materials when they left. Furthermore, 80 percent of companies claimed not to have any kind of review effort to detect whether departing employees took anything with them.
Breach Scan answers this very important question as well as identifying what has been taken. In addition, Breach Scan performs a full assessment to determine all of the devices and media from which data were taken.
Departed employee's are not the only ones that can cause a problem, though. Current employees can also be misbehaving.
Breach Scan can examine a current employee's computer activity to assess both their compliance or non-compliance with organizational policies as well as other issues like:
As part of a settlement agreement or court ordered probation or even to avoid litigation entirely parties can agree to have their computer devices periodically examined as proof of their compliance with or abstinence from certain activities.
Breach Scan can be used to periodically examine a party’s computer devices and media to determine compliance with certain usage and activity requirements or restrictions. Each examination can typically reveal and assess the usage and activity that has occurred over an intervening period of several months and often longer. Thus,Breach Scancan be scheduled periodically and still be very effective.
Breach Scan can be tailored, targeted and optimized to achieve cost, quality and schedule considerations. Business interruption or shutdown is not required.
Breach Scan answers these questions as well as others which can alert management to a serious problem needing immediate attention.
Clients can order Breach Scan on an ad hoc, as needed basis or through retainer based service arrangements when recurring review capability is desired as part of established computer security procedures or employee termination procedures.
Breach Scan have quick turnarounds and are favorably priced either on as as required basis or as part of a cyber assurance program.
Your computers may be protected from an outside attack but how about from an internal one?
When everything else has failed,
Is the last best line of defense.