Expert assistance - anytime, anywhere
When your organisation is impacted by a cyber security breach, a clear understanding is needed to take control of the situation and respond quickly and effectively to protect your assets, operations, and reputation. Whether the incident is the result of an external actor or insider, Redscan and Kroll’s global network of incident response experts are ready to help as fast as possible, with the technology to support both remote and on-site investigations.
Kroll, Redscan’s parent company, is a leading provider of end-to-end cybersecurity, digital forensics and breach response services – responding to over 2000 security events every year. Our goal is to quickly contain the compromise and smoothly guide you to recovery, to leave your organisation in the strongest position possible, with minimal business disruption and your reputation intact.
- What is incident response?
Incident response is the approach an organisation takes to respond to, manage, and mitigate cyber security incidents. The ultimate goal of incident response is to limit the damage and disruption of attacks and, where necessary, restore operations as quickly as possible.
- What is a security incident?
A cyber incident or cyber security incident is an event that could lead to a compromise of confidentiality, integrity or availability. In practical terms, this could include an unauthorised data breach, unlawful data processing, the altering of data without consent, or a malicious attempt to disruption or denial of service.
- How should you respond to a security incident?
When a security incident occurs, it is important not to let panic set in. Effective incident response requires a clear and robust incident response plan which outlines the actions key stakeholders need to take in a variety of scenarios.
- What is an incident response plan?
An incident response plan is a set of actions and procedures that outlines an organisation’s response to security incidents. An incident response plan is designed to facilitate timely and effective incident mitigation by making it clear what steps should be taken and by whom.
- What should an incident response plan include?
An incident response plan should include guidance for:
- the assignment of responsibilities between responders
- the outlining of technical protocols and escalation points
- planning for resource gathering and documentation
- establishment of communications and notification procedures
- determining a review and testing schedule
- What is a CSIRT?
A Computer Security Incident Response Team, or CSIRT, is a group of experts responsible for responding to security incidents. A CSIRT will include the security, IT and digital forensics staff responsible for other cyber security functions, but may also include PR, HR or legal personnel to help with breach reporting and notification requirements.
- What are the six steps of incident response?
The six steps of incident response are as follows:
- Preparation – incident response planning and process creation
- Identification – information gathering and incident analysis
- Containment – patching and damage limitation
- Eradication – threat removal and mitigation
- Recovery – returning systems to full operation
- Learnings – identification of improvements, further testing
Kroll EMEA hotline: +44 (0) 808 101 2168
- Business Email Compromise
- Advanced Persistent Threats
- Malware, keyloggers and backdoors
- Insider threats
- Web application attacks
- Targeted IP theft
- Supply chain attacks
- Flexible, on-demand services to suit a wide range of security needs
- Recognised by CREST and the PCI Council
- A team of over 450 DFIR experts globally
- >2,000 security incidents responded to every year
Complete the form for a prompt response from our team.