Contact Us

Contact Us

Please get in touch using the form below

1000 characters left
I prefer to be contacted by:
View our privacy policy
Book a penetration test today. Get in touch.


Expert assistance - anytime, anywhere

When your organisation is impacted by a cyber security breach, a clear understanding is needed to take control of the situation and respond quickly and effectively to protect your assets, operations, and reputation. Whether the incident is the result of an external actor or insider, Redscan and Kroll’s global network of incident response experts are ready to help as fast as possible, with the technology to support both remote and on-site investigations.

Kroll, Redscan’s parent company, is a leading provider of end-to-end cybersecurity, digital forensics and breach response services – responding to over 2000 security events every year. Our goal is to quickly contain the compromise and smoothly guide you to recovery, to leave your organisation in the strongest position possible, with minimal business disruption and your reputation intact.

Incident response services

Remote and on-site
incident response services

Whether you need help in an emergency or long-term support to enhance your organisation’s incident response procedures, our experts are on hand 24/7 to provide assistance across the incident lifecycle.

Our incident response services include:


Cyber incident response service features

Get the help your organisation needs to quickly respond to incidents and minimise damage and disruption, but also support to formulate an effective incident response plan for the future.

24/7 support and assistance

Should the worst happen, our experienced global team of cyber incident response experts are available to provide remote and on-site support around-the-clock.

Deep forensic investigations

By leveraging our computer forensic expertise and traditional investigative techniques, we help ensure no digital evidence is overlooked and you have an accurate picture of any systems and data that have been compromised.

Detailed reporting and remediation guidance

Our experts can help to clearly communicate the impact of incidents to internal stakeholders, partners, customers and regulators. To help you overcome incidents as quickly as possible, we provide remediation advice and support to help overcome them and avoid the risk of suffering additional damage and disruption.

Incident response planning and validation

Our incident response service and security assessment specialists can help you to build and implement a robust incident response plan and validate its effectiveness with table-top exercises, such as Scenario-based Assessments and Red Team Operations.

Incident response FAQs

Frequently asked questions

What is incident response?

Incident response is the approach an organisation takes to respond to, manage, and mitigate cyber security incidents. The ultimate goal of incident response is to limit the damage and disruption of attacks and, where necessary, restore operations as quickly as possible.

What is a security incident?

A cyber incident or cyber security incident is an event that could lead to a compromise of confidentiality, integrity or availability. In practical terms, this could include an unauthorised data breach, unlawful data processing, the altering of data without consent, or a malicious attempt to disruption or denial of service.

How should you respond to a security incident?

When a security incident occurs, it is important not to let panic set in. Effective incident response requires a clear and robust incident response plan which outlines the actions key stakeholders need to take in a variety of scenarios.

What is an incident response plan?

An incident response plan is a set of actions and procedures that outlines an organisation’s response to security incidents. An incident response plan is designed to facilitate timely and effective incident mitigation by making it clear what steps should be taken and by whom.

What should an incident response plan include?

An incident response plan should include guidance for:

  • the assignment of responsibilities between responders
  • the outlining of technical protocols and escalation points
  • planning for resource gathering and documentation
  • establishment of communications and notification procedures
  • determining a review and testing schedule
What is a CSIRT?

A Computer Security Incident Response Team, or CSIRT, is a group of experts responsible for responding to security incidents. A CSIRT will include the security, IT and digital forensics staff responsible for other cyber security functions, but may also include PR, HR or legal personnel to help with breach reporting and notification requirements.

What are the six steps of incident response?

The six steps of incident response are as follows:

  1. Preparation – incident response planning and process creation
  2. Identification – information gathering and incident analysis
  3. Containment – patching and damage limitation
  4. Eradication – threat removal and mitigation
  5. Recovery – returning systems to full operation
  6. Learnings – identification of improvements, further testing

Get immediate incident response assistance

Kroll EMEA hotline: +44 (0) 808 101 2168

Incident response support

The support to manage security incidents, whatever the scale

Building an incident response plan to deal with breaches as and when they arise is fraught with unknowns. Our unique and extensive frontline experience means we can help you make informed decisions at every stage. Kroll’s incident response and forensics experts have the expertise to investigate cyber incidents of all types – no matter the type, complexity or severity. We can deploy remote solutions quickly and/or be onsite within hours.

Common threats our incident response services help to address:

  • Business Email Compromise
  • Advanced Persistent Threats
  • Malware, keyloggers and backdoors
  • Ransomware
  • Insider threats
  • Web application attacks
  • Targeted IP theft
  • Supply chain attacks

Incident response retainer

Flexible incident response retainers

To help your organisation respond faster and more effectively to security incidents, Kroll’s cyber risk retainer provides elite digital forensics and incident response capabilities on-demand. Kroll’s services are flexible and configurable to the needs of your environment, regardless of the technologies you use.

With a transparent pricing model to ensure you get value for money, a Kroll cyber risk retainer provides peace of mind that security and forensics experts are on hand to support incident investigation, notification, containment and remediation.

About us

Why choose Redscan and Kroll
for incident response

A Redscan employee shakes hands with a partner
  • Flexible, on-demand services to suit a wide range of security needs
  • Recognised by CREST and the PCI Council
  • A team of over 450 DFIR experts globally
  • >2,000 security incidents responded to every year

Request assistance

Complete the form for a prompt response from our team.

Two Redscan team members analysing cyber security intelligence

1000 characters left
I prefer to be contacted by:
View our privacy policy


Discover our latest content and resources

From the blog
From the blog Case studies Latest news
23rd November 2021
UK business leaders anticipate significant cyber threat increase in 2022
The majority of UK business leaders anticipate that cyber threats will increase significantly in 2022, according to a recent survey.  
15th November 2021
Europol: ransomware gangs focusing on high profile targets
A new report from Europol states that ransomware gangs have increasingly focused on high-profile targets such as large corporations and government institutions over the past year.
9th November 2021
Cloud adoption increases to 90%
A new report shows that cloud adoption has risen to 90%. However, organisations are being hampered by cost and regulatory challenges.
1st November 2021
More than two-thirds of workers at risk of a cyber-attack
A recent study showed that over two-thirds of UK employees use their personal mobiles for work, posing a  significant threat to company security.