My brother is an IT guy and writes for ComputerWorld. He gives a list of what to do after your servers get hacked.
My brother on what to do after you get hacked
Published by Robert Scoble
I help entrepreneurs build their technology business' story, help with getting ready for investors, with other launch plans, and many other strategic things that can help your new startup. Call to talk: +1-425-205-1921 (text first). View all posts by Robert Scoble
Published
#1 Look at your computer for the last time.
#2 Get a Mac.
#3 There’s no step #3.
LikeLike
#1 Look at your computer for the last time.
#2 Get a Mac.
#3 There’s no step #3.
LikeLike
#1 Look at your computer for the last time.
#2 Get a Mac.
#3 There’s no step #3.
LikeLike
My guess is for 99% of the admins out there step 11: ‘blow the operating system away, reinstall from scratch, and focus on preemptive security. ‘ would be the only step. Time pressure, stretched budgets, it’d be lovely to have the time to go on a forensics safari but I sure don’t.
LikeLike
My guess is for 99% of the admins out there step 11: ‘blow the operating system away, reinstall from scratch, and focus on preemptive security. ‘ would be the only step. Time pressure, stretched budgets, it’d be lovely to have the time to go on a forensics safari but I sure don’t.
LikeLike
My guess is for 99% of the admins out there step 11: ‘blow the operating system away, reinstall from scratch, and focus on preemptive security. ‘ would be the only step. Time pressure, stretched budgets, it’d be lovely to have the time to go on a forensics safari but I sure don’t.
LikeLike
Ok, patch your systems daily and run IDS’s and you will not get hacked, I really hate it when an admin says “We have to test the patches first”, Well that’s the vendor’s job wether it be MS, Redhat, etc…
If you do get hacked,
1. don’t blow it away, remove the box from the network,
2create a snapshot of the system (for legal reasons.)
3. blow away and reinstall, or better yet, pull the drives and install new drives and rebuild the system.
LikeLike
Ok, patch your systems daily and run IDS’s and you will not get hacked, I really hate it when an admin says “We have to test the patches first”, Well that’s the vendor’s job wether it be MS, Redhat, etc…
If you do get hacked,
1. don’t blow it away, remove the box from the network,
2create a snapshot of the system (for legal reasons.)
3. blow away and reinstall, or better yet, pull the drives and install new drives and rebuild the system.
LikeLike
Ok, patch your systems daily and run IDS’s and you will not get hacked, I really hate it when an admin says “We have to test the patches first”, Well that’s the vendor’s job wether it be MS, Redhat, etc…
If you do get hacked,
1. don’t blow it away, remove the box from the network,
2create a snapshot of the system (for legal reasons.)
3. blow away and reinstall, or better yet, pull the drives and install new drives and rebuild the system.
LikeLike
Simple: dump your windows infrastructure, and go with a securable system instead. If you have windows apps you can’t get rid of, run them under VMWare on Linux, BSD, Solaris, or (coming soon), Mac OS X. They’ll still get pwn3d, but you can trivially restart them from a pristine image.
LikeLike
Simple: dump your windows infrastructure, and go with a securable system instead. If you have windows apps you can’t get rid of, run them under VMWare on Linux, BSD, Solaris, or (coming soon), Mac OS X. They’ll still get pwn3d, but you can trivially restart them from a pristine image.
LikeLike
Simple: dump your windows infrastructure, and go with a securable system instead. If you have windows apps you can’t get rid of, run them under VMWare on Linux, BSD, Solaris, or (coming soon), Mac OS X. They’ll still get pwn3d, but you can trivially restart them from a pristine image.
LikeLike
Definitely agree patching is a necessity, but so is change management. You cant have people making arbitrary changes without documentation.
In response to the above post, IDS are reactive…they do not prevent anything….they are not designed to. It is the vendors job to test that patch to make sure it doesnt cause issues with the OS. It is the administrators job to test the patch to make sure it doesnt interfere with other applications / modifications made since it was a fresh OS. Just throwing on the latest patch blindly is going to cause more problems that it will fix. You have to test patches, no matter the source.
–C
LikeLike
Definitely agree patching is a necessity, but so is change management. You cant have people making arbitrary changes without documentation.
In response to the above post, IDS are reactive…they do not prevent anything….they are not designed to. It is the vendors job to test that patch to make sure it doesnt cause issues with the OS. It is the administrators job to test the patch to make sure it doesnt interfere with other applications / modifications made since it was a fresh OS. Just throwing on the latest patch blindly is going to cause more problems that it will fix. You have to test patches, no matter the source.
–C
LikeLike
Definitely agree patching is a necessity, but so is change management. You cant have people making arbitrary changes without documentation.
In response to the above post, IDS are reactive…they do not prevent anything….they are not designed to. It is the vendors job to test that patch to make sure it doesnt cause issues with the OS. It is the administrators job to test the patch to make sure it doesnt interfere with other applications / modifications made since it was a fresh OS. Just throwing on the latest patch blindly is going to cause more problems that it will fix. You have to test patches, no matter the source.
–C
LikeLike
Quite interesting steps… thanks for points us their!!
—
Balakumar Muthu
LikeLike
Quite interesting steps… thanks for points us their!!
—
Balakumar Muthu
LikeLike
Quite interesting steps… thanks for points us their!!
—
Balakumar Muthu
LikeLike