Verizon Business 2010 Data Breach Investigations Report (PDF) reminds us that there’s a wealth of information contained in the logs. Verizon reports that it “consistently finds that nearly 90 percent of the time, logs are available” One way to help reduce the impact of having so many logs is to centralize them to one or two indexed, searchable locations. Network operations staff monitor router performance and SNMP traps to ensure the network is running smoothly. Another way to identify potential threats is to monitor network data flow more closely.”]

