Block 4 | Albury Office Park | 4 Magaliezicht Ave | Dunkeld West | 2196

Century Technical Solutions

INCIDENT RESPONSE

Computer security incident response is an organized approach to addressing and managing the aftermath of an information security breach or attack. Companies are increasingly transforming their business processes into digital technology in order to maximize their competitive edge. This obligatory move into the complex digital world automatically brings cybercrime vulnerability together.

The purpose of incident response is to identify the cause of the incident, aid in its recovery, and minimize its risks in the future. In the event that an organization wishes to prosecute or litigate a result of an incident response, the forensic evidence gathered in a forensically sound manner during the response can be used for legal purposes.

INCIDENT RESPONSE PROCESS:

PREPARATION

There is no question of if or when an incident will take place. An organization’s preparedness for an incident should be of the utmost importance. As part of this preparation, we can assist in developing security controls and incident response plans. In addition, we can assist with developing incident response capacity through the provision of incident response services or through the continuous development and honing of internal incident response teams.

DETECTION, COLLECTION & ANALYSIS

A security incident occurs when suspicious activities or irregularities are detected on an organization’s information systems. We will then collect data from those affected systems to determine its nature and extent. Data analysis is then performed on this data to determine what happened and draw conclusions.

CONTAINMENT, ERADICATION & RECOVERY

After we analyze the incident, we will help contain it to minimize the impact on the organization, and eliminate the threat posed by it. We aim to protect service integrity, sensitive data, hardware, and software with our containment and elimination strategy. A recovery plan will also be developed to assist the organization.

POST-INCIDENT ACTIVITY

A comprehensive report is then provided to the affected organization once the incident has been resolved, identifying any weaknesses within the information security strategy. It is then possible to propose strategies to improve the organization’s Security posture to mitigate against future attacks once we identify the weaknesses exploited during the incident.