Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How to Stop Data Loss After a Security Breach
Cybersecurity

How to Stop Data Loss After a Security Breach

Frank DomizioBy Frank DomizioDecember 5, 2022Updated:December 5, 20224 Mins Read
Facebook Twitter LinkedIn Email
stop data loss
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

In the first stages of an incident, there are several steps to be taken. We have discussed some already, such as speaking with a lawyer, establishing a communications strategy, and enlisting the help of an experienced incident responder. Another early-stage goal — perhaps the most important— is to stop data loss. Here are a few reasons why, as well as some suggestions on what to do about it.

To Delete or Not to Delete

There are a few schools of thought on how to stop data loss after a breach. One way is to delete everything that may have been infected and start over from scratch. While this will certainly stop data loss, deleting everything is almost never a good idea. You will be permanently destroying valuable evidence that can help you understand how you were breached and what data was exfiltrated. There are also legal and regulatory considerations with this choice. Depending on your industry, you may need to follow specific containment guidelines, which may include reporting. Deleting the evidence makes following the guidelines very difficult.

Taking Infected Systems Offline

Rather than delete everything, a better course of action may be to take the infected systems offline. That can mean anything from removing the infected systems’ network access, to completely powering them off. This action, too, comes with its own set of considerations. Powering off machines will ensure that no further harm can be done, but in doing so, you will lose access to evidence that may exist in volatile memory or RAM.

Fortunately, there are ways to preserve the information in RAM before powering off the computers. The most effective is to image the computers’ memory. This imaging can take anywhere from a few hours for a laptop, to multiple days for large servers, depending on the amount of RAM and the speed of your connection.

You’ll need specific tools to image the computer’s memory. There is an entire category of software called Endpoint Detection and Response (EDR) that features the ability to acquire a memory image at the push of a button. Crowdstrike Falcon, Trend Micro XDR, and Cisco Secure Endpoint are all popular examples of EDR software. Keep in mind that these types of acquisitions also add time to the process as that much data traveling across your network is slow.

Deployment of an EDR typically would have needed to be done prior to an incident, but all hope is not lost if you have not done so. You can use tools like Volatility, BlackLight, or a suite like Kali Linux to image RAM after the incident.

The Hybrid Strategy to Stop Data Loss

The hybrid strategy to stop data loss involves taking some immediate steps to prevent further loss without destroying evidence and then also leaving steps for further down the road.

The immediate, short-term steps may involve isolating network segments to prevent the further spread of the infection while you track down exactly what happened. In the long term, further down the road, you are going to want to make sure that the initial causes are dealt with, which means ensuring patches are deployed and misconfigurations are corrected.

Rebuilding from Backups

In the aftermath of a breach, whether you are rebuilding machines in the cloud or buying new servers to put in your racks, you will most likely be rebuilding from a backup. But if an attacker has been in your network for some time, there’s a chance that your backups are infected. You want to prevent yourself from restoring bad backups. At the very least, virus and vulnerability scans are in order. If time permits, having threat hunters examine your backups for indicators of compromise can give you peace of mind.

Final Thoughts

There are no hard and fast answers that can apply to every incident. Each investigation is unique and comes with its own challenges. There is a true balancing act between performing a complete and thorough investigation and keeping costs and downtime under control. In other words, these are not simply IT decisions. Top executives and others from around your business will need to be involved in the process. As long as you show up armed with knowledge, options, and flexibility, you will be in an excellent place to advise your business and accordingly act on decisions to prevent data loss.

Click here to join the conversation on linkedin

Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cloud Cybersecurity data featured vulnerability Vulnerability management
Share. Facebook Twitter LinkedIn Email
Frank Domizio
  • LinkedIn

Frank Domizio is an Acceleration Economy Analyst focusing on Cybersecurity. As a retired Philadelphia Police Officer, Frank got his start in cybersecurity while he was detailed to the FBI as a digital forensic examiner. Since then, Frank has held many positions in and around the federal government specializing in Cyber Threat Intelligence and Incident Response. Now, as a Federal Civilian for an Executive Branch Agency, Frank is a student of the strategy and leadership that goes into making a successful cybersecurity program. He is also an adjunct professor of cybersecurity at the University of Maryland Global Campus. Frank holds a Bachelor of Science in Computing Security Technology from Drexel University and a Master of Science in Cyber and Information Security from Capitol College as well as many industry certifications. As a Federal Government Employee Frank’s views are his own, not representing that of the U.S. Government or any agency.

Related Posts

ServiceNow and Juniper Networks Partner to Deliver AI-Powered Automation for MSPs

June 11, 2025

Microsoft-ServiceNow Partnership Focuses on Autonomous Agent Innovation

June 11, 2025

AI Agent & Copilot Podcast: Kyndryl AI Readiness Report Finds People, Orgs Have a Steep Hill to Climb

June 11, 2025

IBM Invests in NYC AI Ecosystem with Cutting-Edge Developer Hub

June 11, 2025
Add A Comment

Comments are closed.

Recent Posts
  • ServiceNow and Juniper Networks Partner to Deliver AI-Powered Automation for MSPs
  • Microsoft-ServiceNow Partnership Focuses on Autonomous Agent Innovation
  • AI Agent & Copilot Podcast: Kyndryl AI Readiness Report Finds People, Orgs Have a Steep Hill to Climb
  • IBM Invests in NYC AI Ecosystem with Cutting-Edge Developer Hub
  • Oracle Will Leapfrog Google Cloud as World’s #1 Hottest Cloud Vendor

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.