Incident Response
While we do not perform incident response service due to time and staffing constraints we do assist with network hardening and pre / post incident consulting. The following quick checklist will help you know what steps you can take immediately.
What should I do?
- STOP USING THE SYSTEM. NOW. SERIOUSLY. STOP.
- Wait! Don’t turn it off. If you are worried about losing sensitive data disconnect the network cable but volatile data stored in memory will be lost if you turn it off.
- Take a deep breath and contact an incident response organization.
- Determine what you want to do to recover your system.
- Forensic imaging can take a significant amount of time; plan for that during the recovery phase.
Ever wonder how much a data breach could monetarily cost your company or organization?
A data breach occurs when data is disclosed to any unauthorized personnel, maliciously or unintentionally. Sensitive data can include: protected health information (PHI), personally identifiable information (PII), credit card information, financial information, intellectual property and many other forms of information depending on the business and the industry.
Many industries and businesses must follow state and federal regulations in order to prevent data breaches. If a data breach occurs not only will it affect an organizations reputation and public image, but it will also add a significant financial strain. The affected organization will need to cover the cost for customer notification, legal fees, state or federal fines, crisis management consulting and credit monitoring.
Using the data breach risk calculator you can estimate the cost incurred after your organization experiences a data breach. The calculator can estimate the probability that you will experience a data breach in the next 12 months, the estimated cost per record, and the estimated total cost of the breach.