<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" >
   <channel>
    <atom:link href="https://cyberadvisors.webnode.page/rss/data-breach-management-articles.xml" rel="self" type="application/rss+xml" />
      <title><![CDATA[Data Breach Management Articles - privacyrisksadvisors.com]]></title>
      <link>https://cyberadvisors.webnode.page</link>
      <language>en</language>
      <pubDate>Sun, 05 Jan 2014 10:04:00 +0200</pubDate>
      <lastBuildDate>Sun, 05 Jan 2014 10:04:00 +0200</lastBuildDate>
      <category><![CDATA[Data Breach Management Articles]]></category>
      <docs>http://blogs.law.harvard.edu/tech/rss</docs>
      <generator>Webnode</generator>
      <item>
         <title><![CDATA[How to preserve forensic evidence in the golden hour after a breach - By Martin Roots]]></title>
         <link>https://www.privacyrisksadvisors.com/news/how-to-preserve-forensic-evidence-in-the-golden-hour-after-a-breach-by-martin-roots/</link>
         <description><![CDATA[
	Most IT managers focus on providing their users with a good level of service and support, for example keeping the network up and running and&nbsp;making sure the systems are free from malware.


	But what should their response be when the boss comes into the office and tells them that one of their PCs or similar devices may have been involved in some&nbsp;inappropriate activity&nbsp;and needs to be examined for an investigation? How many IT managers would know what to do to preserve as much...]]></description>
         <pubDate>Sun, 05 Jan 2014 10:04:00 +0200</pubDate>
         <guid isPermaLink="true">https://www.privacyrisksadvisors.com/news/how-to-preserve-forensic-evidence-in-the-golden-hour-after-a-breach-by-martin-roots/</guid>
         <category><![CDATA[Data Breach Management Articles]]></category>
      </item>
   </channel>
</rss>