- Any attempt to gain unauthorized access to a system or its data - even if unsuccessful
- Disruption or denial of service caused by unauthorized access
- Changes to system hardware or software without consent
- Violations of an explicit or implied security policy
Even the most secure information systems cannot guarantee that a security incident will never take place. Rehmann's Computer Security Incident Response group can help you:
- Identify vulnerable areas of the organization
- Recognize that a computer security breach has taken place
- Analyze what happened to mitigate future threats
- Respond to the incident to limit damage
- Recover by getting your systems back in operation