Incident Response
Respond fast, minimize damage when attacked
1. 1 Hour Delay = Billions in Increased Damages
No matter how strong the defense system is, no boundary is absolutely safe. When a system is breached (Ransomware encrypts data, customer databases leak, Website gets defaced), how you respond in the first 24 hours will determine the survival of the business.
Lacking an Incident Response plan leads to panic, accidental deletion of evidence logs, useless ransom payments, and facing a media crisis.
2. 6-Step International Standard Incident Response Process (SANS/NIST)
| Step | Action Description |
|---|---|
| 1. Preparation | Script scenarios before incidents occur. Build procedures (SOP), clear personnel assignments, establish alerting systems (SIEM). |
| 2. Detection | Analyze alerts from IDS/IPS, EDR, SIEM to confirm if this is a real security incident. |
| 3. Containment | Disconnect infected servers/workstations from the network. Absolutely do not power off to preserve RAM evidence. |
| 4. Eradication | Remove malware, disable hacked accounts, patch vulnerabilities exploited for entry. |
| 5. Recovery | Bring systems back online from clean backups. Monitor closely for the next 48 hours. |
| 6. Lessons Learned | Hold review meetings, conduct Root Cause Analysis, update security policies. |
3. Services Provided by Cyber IT Security
- IR Plan Development: Draft procedures, templates, and contact matrices specifically for your business.
- Tabletop Exercise: Organize simulated Ransomware and Phishing attack drills to test the reflexes of the IT team and Board of Directors.
- Retainer Service (Emergency Support): Cyber IT Security experts commit to being present and handling incidents within 2-4 hours when a business is attacked.
Solution Packages
IR Plan Development
Draft procedures, templates, and contact matrices.
Contact Us
Retainer Service
Guaranteed SLA for incident response within 2-4 hours.
Contact Us
Tabletop Exercise
Simulate attacks to test the reflexes of your IT team.
Contact Us
