If you have suffered a security breach of your computer network and are looking for advice on Incident Response, Core-Infosec’s team of security consultants are at immediate hand.

Our Incident Response team will join you for a free, no-obligation, 30-minute conference call to discuss your situation and offer expert advice. Time is critical in containing the breach – your organization must, therefore, act swiftly to prevent further compromise. Whether your incident involves hacking, malware, Denial of Service (DoS/DDoS) or an insider threat, Core-Infosec has the skills to ensure that the breach is effectively managed.

I am worried about being hacked in the future, can you help?

Your fears are understandable, all of the statistics indicate that the majority of organizations will suffer a cyber-attack over a 12 month period. During the year 2018 a total of 1,244 breaches were reported with one happening every 7-hours 3-minutes.  You can make yourself more resilient to these attacks by taking the right preparation steps.

STEP 1

Compile an inventory of your assets, then identify the critical assets and data that you hold.

STEP 2

Develop a plan that will outline the steps that your organization will take during an incident.

STEP 3

Undertake some testing on your Incident Response plan.

STEP 4

Ensure that you have some staff trained to develop First Responder capability.

STEP 5

Either train technically staff to conduct Incident Response activities or ensure you have swift access to such capability.

Time Until Next Cyber Security Breach

What should we do if we are hacked in the future?

Call us immediately. Core-Infosec has published some advice on steps to take during a breach. Our experience is that a lack of logging is the biggest barrier to establishing the root cause of an incident.  However, there are also missteps that organization’s take during an investigation that significantly hamper efforts to manage an incident:

You should, therefore, AVOID the following mistakes that businesses often make:

  • Immediately remediating the breach. Not preserving artifacts left by an attacker makes establishing a timeline of events almost impossible.
  • Calling in expertise far too late. Many organisations attempt to manage the breach internally. Without the necessary experience, the likelihood is that the organisation will fail, creating additional problems for a skilled team of investigators who subsequently get called in.
  • Prioritizing root cause. Whilst trying to establishing the root cause of a breach the attacker can be moving into your environment. Prioritise containment.

Trusted Partners

Contact Us

Close Menu
×

Cart