| 2 minute read

What Every Business Leader Needs to Know About Breach Investigations

keyboard with cybersecurity word cloud

In the wake of a cybersecurity incident, executives often pose a deceptively simple question to their incident response teams: “Can you tell us exactly how the attackers got in, what they did while inside, and whether they’re still there?”

It’s a fair ask – after all, clarity drives decisions on containment, recovery, and disclosure. Yet the reality is far more nuanced. The ability to deliver precise, defensible answers hinges less on the sophistication of the forensics team and more on the proactive measures your organization implemented before the breach ever occurred.

Here’s the hard truth: A breach investigation is only as good as the data you preserved in advance.

The Three Questions – and Why They’re Not Always Answerable

  1. “How did they get in?”

Without comprehensive ingress logging (e.g., firewall, WAF, email gateway, and endpoint telemetry), attackers can enter through blind spots.

Example: A phishing email deletes itself after execution, and no mail flow logs are retained beyond 30 days. Result? The initial vector becomes a hypothesis, not a fact.

  1. “What did they do while inside?”

Lateral movement, privilege escalation, and data exfiltration leave traces – but only if you’re capturing them.

  • Centralized endpoint detection and response (EDR) with long-term retention is non-negotiable.
  • Without process-level logging (e.g., PowerShell execution, WMI activity), you’re reconstructing a crime scene with the lights off.
  1. “Are they still in?”

Persistence mechanisms (scheduled tasks, registry run keys, rogue accounts) are detectable – but only if you have a baseline of “normal.”

  • Immutable audit logs and regular credential resets are your insurance policy.
  • No baseline + no change monitoring = “We can’t rule it out.”

The Pre-Breach Decisions That Determine Post-Breach Clarity

Pre-Breach Action

Post-Breach Impact

Log retention < 90 days

Critical evidence overwritten; timeline gaps

No EDR or SIEM

Blind to lateral movement; “We think they were here for 6 months”

Default admin accounts

Impossible to distinguish legit vs. attacker activity

No network segmentation

Attackers roam freely; scope becomes “the entire domain”

Immutable backups offline

Fast recovery; reduces attacker leverage

Regular threat hunting

Baselines exist; anomalies stand out

Real-World Example

A mid-sized financial firm suffered a ransomware attack. Leadership demanded: “Show us the patient zero and prove they’re gone.”

The problem:

  • Email logs: 14-day retention
  • No EDR on workstations
  • Domain admin account shared across IT

The outcome:

  • Initial vector: “Likely phishing” (no proof)
  • Dwell time: “30–180 days” (best guess)
  • Containment: Full domain rebuild (no trust)

Cost: $4.2M in downtime, forensics, and recovery

Lesson: They paid for reactive clarity with proactive neglect.

Your Action Plan Before the Next Incident

  1. Extend log retention to 12+ months (cloud costs are trivial vs. breach fallout).
  2. Deploy EDR everywhere and feed it into a SIEM with alerting.
  3. Enforce least privilege – No shared admins, no local accounts with domain rights.
  4. Segment critical assets – Zero trust isn’t a buzzword; it’s containment.
  5. Test your IR plan quarterly – Internal tabletops are free; surprises are not.

The next time your CISO says, “We can’t be 100% sure,” don’t blame the investigators. Blame the architecture built when “it won’t happen to us” was the strategy.

Cyber resilience isn’t just about stopping breaches – it’s about ensuring that when one occurs, you can answer the hard questions with evidence, not excuses.

If you have questions or want to discuss any of Avalon's cybersecurity services, contact our experts today

Blog Articles

What Every Business Leader Needs to Know About Breach Investigations

In the wake of a cybersecurity incident, executives often pose a deceptively simple question to their incident response teams: “Can you tell us exactly how the attackers got in, what they did while inside, and whether they’re still there?”

Employee Spotlight: Catelyn Allen

Every once in a while, we like to show off one of our hard-working, detail-oriented problem solvers. Take a moment to see who's in the spotlight today!

How Early Case Assessment Levels the Playing Field for Midsize Firms

When facing off against Big Law, midsize firms often grapple with a familiar challenge: delivering the same quality of representation – with a fraction of the resources. The good news? With the right technology and support, smaller firms can compete head-to-head on insight, strategy, and results.