Incident Response
From Credit Card and PII data breaches to Ransomware extortion attacks, we have 20 years of experience managing and responding to security incidents. Immediately following an incident, we work with our clients to gather as much forensic data as possible to understand how intruders entered the network and the scope of their exploitation.
We then work with management to prioritize strategic options which may include efforts to contain the breach, restore critical systems or pursue the attackers. Our technical staff is well versed in making changes that are designed to cut off attackers and restore IT services both on-premise and in the cloud.
Our Process
Our philosophy is that incident response is largely a race against time – the longer systems have been impacted the more damage is done. Therefore our approach emphasizes speed and decisiveness.
Within the first 24 hours following an incident, we will work with your team to build a plan. We will then follow through with managerial guidance and technical expertise to bring the indigent to closure quickly. In the process, we work closely with key stakeholders, including: