It
During the years, we have seen attacks move from Web server defacements to organized crime rings attempting to steal data -- anything from credit card and Social Security numbers to customer records and unreleased product designs. Criminal enterprises from Eastern Europe, Asia, and the United States are making a lot of money targeting your databases.

Now you need to figure out how the breach happened, what the damage is, and the best way to fix it -- and then make very sure it never happens again.

In all breach incidents, one of the first decisions is whether to contact the authorities. This choice must be made early in the process because it can have a dramatic effect on how the incident is handled.

The link for this article located at Dark Reading is no longer available.