There’s more to Incident Response than just resolving a breach. Because a breach can also cause reputational damage and result in regulatory fines on top of the business impact, CSIRT (Computer Security Incident Response Team) plans should include the IT Manager, who advises the team of the situation as it relates to the breach, as well as company board members, the marketing team and legal to cover all bases.
That’s why we’ve added this capability to our portfolio. The Vox Incident Response Service offers CSIRT planning as well as actual incident response services to help deal with the threat in the incident.
By using the NIST (National Institute of Standards and Technology) incident response cycle of:
Our Incident Response Service aims to help you get back to business quickly with minimal impact, reputational damage and data loss.
Incidents don't only happen during 9 to 5. Our team will deploy quickly to get you up and running no matter the hour.
While the Vox Incident Response team can handle some incidents we can also act as the feet on the ground for our global partner to handle more sophisticated events, work with law enforcement and build profiles of the threat actors.
We work with a few Cyber Insurers to handle their Incident Response requirements and these can be processed as part of your claim.
We offer annual retainers of hours paid monthly to allow a smoother service without breaking the bank.
During an Incident Response, we'll collect data to understand the attack but to also try identify the threat actors.
The service also looks for hidden threats that might launch a secondary attack after the initial attack has been resolved.
We offer this service to companies who don’t have the resources to do so, and add to our ability by partnering with global forensic companies to offer the best incident response capabilities out there.
Vox offers annual retainers of 60, 110 and 210 hours which can be used towards the service. It’s also possible for customers to activate an ad hoc service and be billed for the hours on conclusion.
It can be any cybercrime, like a ransomware attack, DDoS attack, phishing attempt, Wi-Fi spoofing and so on.
A report of findings is delivered and we consult on how remediation can be done.
An analysis of the breach and an examination of your entire security portfolio is advisable, with recommendations of where to focus efforts to prevent future attacks. We can also consult on a CSIRT plan and look at other procedures to assist prevent further incidents.