In responding to an attack, the responder risks exposing his/her administrative credentials to the attacker and thus inadvertently helping the bad guys spread the threat from one system to others. That’s not a good situation. But there’s a better way, and in this SANS blog post, you’ll find more info about what you can do to protect yourself in an incident response situation and links to a more in-depth presentation on this subject. You can check it out here:
About The Author
Debra Littlejohn Shinder is a technology and security analyst and author specializing in identity, security and cybercrime, utilizing her past experience as a police officer and police academy/criminal justice instructor. She has written numerous books and articles for web and print publications and has been awarded the Microsoft MVP designation for fourteen years in a row.