Problem solve Get help with specific problems with your technologies, process and projects.

Retaking command of your hacked software

Once you are certain you software has been hacked and your information compromised what can you do to retake control of your software? Expert, Kevin Beaver explains the steps to recovery.

Once a Web site has been hacked, what are the proper steps for re-taking control my system?
You actually have several options: 1) you can run around screaming like your hair's on fire and react to the situation (only to make things worse), 2) you could unplug the system and restore it from backup (and hope your backups go far back enough), or 3) you could launch a formal forensics investigation involving forensics investigators from private firms or even law enforcement if it's bad enough. The thing is you have to plan ahead for this type of situation so you're well-prepared when the time comes. This requires working with the right people in your organization (IT, security, HR, PR, customer service, operations, and legal) to put together an incident response plan that makes sense for your business.

Dig Deeper on Software Security Testing Tools

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.