Incident Response & Threat Containment
Approach & Methodology
Our incident investigations follows the steps below:
- Intelligence Gathering: We assess the situation surrounding the incident and gain an understanding of any actions taken to defend your IT infrastructure
- Security Investigation: We thoroughly scan and assess each IT system to track down attack evidence and attacker activity within your IT infrastructure. We collect and analyze all evidence found to determine the attack vectors, attacker activity timelines, and the extent of the breach
- Business Guidance: We work closely with your IT team and management to assist in taking the proper remediation actions and business decisions
- Remediation Plan Development: Simply Secure assists you by developing a solid remediation plan against future attacks
Deliverables
Simply Secure’s Incident Response team members use various tools, methods, and technologies to assist in our investigations of targeted cyber attacks. These combine together to offer the perfect IT security solutions.
We gather intelligence on the attack and the attackers, and we assess the extent of the breach, the kind and amount of data lost in the attack, and provide you with guidance on defending your IT infrastructure and keeping the bad guys out.
We will provide frequent status updates on our investigations into breaches, including findings and remediation actions.