If you aren't careful, you might destroy the very evidence needed to stop the attacker for good.

Finding out your business has been compromised is a scary moment. As a fellow business owner, I know that your first instinct is usually to panic-fix everything to protect your reputation. But in the world of cybersecurity, your gut reaction can often be a terrible move.
If you aren't careful, you might destroy the very evidence needed to stop the attacker for good.
You will typically learn you’ve been breached in one of three ways:
When a merchant becomes aware of a possible breach, it is understandable that they want to fix it immediately. However, without involving the right people, you could inadvertently destroy valuable forensic data, which will cost you more in the long run. That data helps a forensic analyst determine how and when the breach occurred.
Pro Tip: Think of your network like a crime scene. If you delete files or pull the power plug, you are effectively "mopping the floors" before the detectives arrive. Heavily restrict access to your network following a breach, and if anyone other than your PFI needs access, make sure they log exactly what they do and the time at which they make any changes.
Your primary concern right now should be stopping data loss. Here is what to do:
Once the breach is contained, you need to consult with a forensic PCI Forensic Investigator (PFI). Because of the delicate nature of stolen payment card data and identity theft, when an investigation is mandated by card brands, a PFI is required.
When our team at SecurityMetrics arrives onsite, we obtain forensic copies of the environment and analyze them in our lab to find exactly where the leaks are. A good PFI won’t waste any time in discovering just how threat actors breached your network and what vulnerabilities exist.
Speak with a SecurityMetrics PCI Forensic Investigator today.
Sometimes, business needs dictate that you stay online. While not optimal, you can reduce potential loss by:
Relying on uncertified or "cheap" scans during a breach can leave you exposed to liability shifted back to you in the fine print of your processor's contract.
A breach is a high-stakes test of your business's resilience. Today, we’ve learned that containing the damage is about discipline, not just speed. You have to stop the data loss without destroying the digital fingerprints that tell the story of the attack.
Next Steps:
Need a forensic consultation? Speak with an expert today.