Highlight-image

Hacked? Call +31(0)888883107

Do you need help now? Call our Incident Response Hotline to talk to our experts.

CALL NOW 📞

Incident Response PRO

We can help you prepare for and deal with cyber incidents.

How to deal with cyber incidents

The chances that your organization will suffer a cyber attack are growing. That is why more and more cybersecurity regulations, such as NIS2 or DORA, require implementation of a complete cyber incident response cycle. This involves preparing for incidents, responding adequately to an attack, and knowing what to do afterwards.

You can compare this to the way fire safety has evolved. Of course, putting out fires is still important. But modern fire brigades also take preventive action and evaluate how a fire started in the first place. The same goes for cybersecurity incidents. We can help you prepare for and handle cyber incidents.

Video-placeholder

Watch the video of Incident Response Lead Fabian Bron explaining how Incident Response works (0:57 minutes)

YOUR CHALLENGES

  • How to prepare for severe cybersecurity incidents
  • How to resolve cyber incidents quickly before they escalate into bigger problems
  • How to find out what exactly happened during an incident
  • How to comply with cybersecurity regulations like NIS2 and DORA regarding incident response
Optimal preparation for Incident Response and Forensics

Prepare to handle cyber incidents

Digital forensics

Find out what happened

Complete Incident Response Cycle 3

Comply with regulations like DORA and NIS2

Limit the damage

Our Incident Response PRO service helps you prepare for cyber incidents and guarantees expert help during an incident. This means you can limit potential damages and ensure your business continuity, should you suffer a cyber incident. A subscription consists of two elements:

1. An incident response retainer

You've been hacked - your important systems are down. Now it is important to limit the damage and get back to business as soon as possible. You need immediate support to take quick action. This retainer buys you our guaranteed availability in case of a cyber incident. It also gives you:

  • Guaranteed response times
  • On-site support within 12 hours
  • Discounted incident response fees.

2. Forensic and Incident Readiness Assessment (FIRA)

The last thing you want to find out during an incident, is that your crisis team has no idea what to do or that your organization never preserved the correct digital evidence. That is why we help you prepare for the worst, with our Forensic and Incident Response Assessment (FIRA). We conduct a review of your organization's current incident response capabilities, policies, procedures, and technical controls and logging policies. We identify gaps in your incident response process. Also, we give you recommendations for improvement, based on probability and impact. This assessment results in a written report, and is a great 'intake' for the Incident Response PRO service.

Martijn Jonker

Martijn Jonker

Incident Response Manager

Secura

Attackers don't keep to office hours. This service guarantees you that our Incident Response experts will be available to help you should you suffer a cyber attack.

How we can help you during an incident

01

TRIAGE

What happened? What is the nature of the emergency? You need clarity on the what, when, how and where. This is why our experts first conduct a triage. The outcome of this triage determines the response and the urgency.

02

CONTAINMENT

Most cyber incidents are caused by malware - more specifically: ransomware. During an incident, we want to prevent malware from spreading. What we do depends on the nature and scope of the incident. We often:

  • Disconnect or isolate affected systems or networks from the Internet or other networks
  • Block access to affected systems
  • Implement workarounds to mitigate the impact of the incident

03

MITIGATION

As an incident evolves, we might discover new entry points that attackers can use or may have used. It is important to close these gaps. That's why we often repair vulnerabilities, install patches, reconfigure systems and change passwords.

04

ERADICATION

We can then remove any malicious software, remote access tools, or code that caused the incident. The specific steps again depend on the nature of the incident. We can:

  • Run malware scans to identify and remove malicious software or code
  • Reset affected systems to ensure all malicious code has been removed
  • Delete any unauthorized user accounts
  • Monitor network activity to see if the criminal is still leaving traces

05

RECOVERY

It is important to restore business operations as soon as possible. Steps we might take to this include:

  • Restoring backups to recover lost or damaged data
  • Reconfiguring affected systems to ensure they function properly
  • Testing and validating to ensure all systems are functioning properly
  • Monitoring systems and networks for signs of other incidents or attacks
  • Negotiating with cybercriminals - this is a last resort

Optional follow-up: Digital Forensics

After a cyber incident it is important to know what exactly happened. Not only to prevent it from happening again, but also because you might be initiating legal proceedings. We can help you perform so-called post-mortems on all kinds of systems and equipment, from laptops to phones. Because we are registered as a Private Investigation Bureau with the Dutch Ministry of Justice and Security, our reports and documents can be used in legal proceedings.

Find out more about our Digital Forensic Services.

Downloads

USP

Incident Response PRO Brochure (ENG)

Read about how Incident Response PRO can help you in this brochure.

Download

ACT NOW

Don't wait for disaster to strike. Act now and take the necessary steps to prepare your organization for a cyber attack or incident. Fill out the form below, and we will contact you within one business day.

USP

Related Services

Tabletop Cyber Crisis Management

Tabletop Cyber Crisis Management

Assess and improve your organization's cyber resilience with Secura's Tabletop Cyber Crisis Management. Prepare for cyberattacks by identifying key points of contact, responsibilities, and response steps.

Ransomware Resilience Assessment

Ransomware Resilience

Secure your business with Secura's Ransomware Resilience Assessment. We identify vulnerabilities to ransomware attacks, provide actionable advice, and bolster your defenses across people, process, and technology. Start enhancing your cybersecurity today.

Digital Forensics

Digital Forensics Trace Investigation

Secura offers expert digital forensic trace analysis by qualified private investigators. Compliant with legal frameworks and certified to ISO standards.

Why choose Secura | Bureau Veritas

At Secura/Bureau Veritas, we are dedicated to being your trusted partner in cybersecurity. We go beyond quick fixes and isolated services. Our integrated approach makes sure that every aspect of your company or organization is cyber resilient, from your technology to your processes and your people.

Secura is the cybersecurity division of Bureau Veritas, specialized in testing, inspection and certification. Bureau Veritas was founded in 1828, has over 80.000 employees and is active in 140 countries.