Problem solve Get help with specific problems with your technologies, process and projects.

Network recovery: After the security breach

Network security will never be completely secure. Despite a VAR's best efforts, there's always the risk of a security breach. Channel pros need to be ready with the appropriate tools and strategies to achieve a successful network recovery.

Occasionally, all the network intrusion management software and appliances in the world aren't enough to prevent a breach of security on a customer's network. In the event of an intrusion, VARs and consultants need to be ready with the appropriate tools and strategies to recover the network and get everything up and running again.

How to recover your network after a security breach

If you have the time and money to invest in some of the more impressive network management systems, you can possibly recover your network by clicking a few buttons. If you're on a budget, with a typical medium sized network, here's a list of things you should do when you discover something amiss.

  1. Preserve the logs
  2. Notify the proper authorities
  3. Check your infrastructure for compromise
  4. Restore your configuration

Get more tips on network recovery after a security breach.

About the author
Tom Lancaster, CCIE# 8829 CNX# 1105, is a consultant with 15 years of experience in the networking industry. He is co-author of several books on networking, most recently,
CCSP: Secure PIX and Secure VPN Study Guide, published by Sybex.

This was last published in April 2007

Dig Deeper on Wireless networks technology and services

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

MicroscopeUK

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchDataManagement

SearchBusinessAnalytics

Close