In addition to a frontline information security posture, corporations, government agencies and other organizations should have in place the appropriate procedures to respond to a security breach to their network environment. Trustwave has a proven track record of assisting a variety of organizations - Fortune 500 business, not-for-profit organizations, financial and educational institutions, government agencies, law firms and small to mid-size companies - in responding to compromises and conducting computer forensic investigations. Trustwave's incident response and forensics services provide organizations the assurance that they will have a trusted partner ready to respond when needed.
Trustwave has responded to hundreds of global security incidents, performed thousands of ethical hacking exercises and security tested hundreds of business applications for Fortune 500 businesses. With that experience, Trustwave is expanding its capabilities to provide the following specific incident response and forensics services within the practice:
â¢ Custom malware detection and reverse engineering
â¢ Data compromise investigation
â¢ Employee computer mis-usage analysis
â¢ Incident response readiness training
â¢ Network and application intrusion analysis
â¢ Retained forensics
Javelin Strategy & Research recently released a survey of 400 consumers affected by a data breach. The survey concluded that security breaches caused 55% of victims to trust breached organizations less with their account information, while 30% said they would never purchase goods or services from the affected organization.
âA security breach may damage the reputation of an organization and result in loss of revenue,â says Robert J. McCullen, chairman and CEO of Trustwave. âTrustwave experts mitigate the risk of exploitation with a ready-to-activate incident response plan that responds quickly and efficiently, using cutting-edge techniques to minimize the effect of an intrusion, while safeguarding critical assets.â
Trustwave recently released a report detailing its findings of 350 cases of data security compromise in 14 countries between January 2006 and December 2007. Based on merchant level as defined by the transaction volume and type of transactions performed by a merchant, the report finds that smaller Level 4 merchants are being targeted by malicious hackers. This is due, in part, to their reliance on third-party point-of-sale (POS) vendors whom they assume are securing their network when they install their payment application. Unfortunately, those third-party independent sales organizations are not skilled in internet security and neither are the smaller Level 4 merchants, leaving them vulnerable for hackers.