JIT Solutions | Computer Security Incident Response - CyberSec Recovery - JIT Solutions
JIT Solutions is here to help immediately after a digital threat or cyber attack has compromised your Corporate Digital properties. From Data recovery to attacker tracking and Preventive actions - we would make sure to get you back up and running in no time.
10698
page-template,page-template-full_width,page-template-full_width-php,page,page-id-10698,mikado-core-2.0.4,ajax_fade,page_not_loaded,,mkd-theme-ver-2.1,smooth_scroll,transparent_content,wpb-js-composer js-comp-ver-6.0.5,vc_responsive
 

Cyber Security Incident Response

Our Incident Response Team is always ready

In cases of:

  • Breach of corporate infrastructure by attackers
  • Failure in operations of any elements part of your digital infrastructure
  • A personal computer / device or workstation gets infected

The 3 phases of Incident Response:

  1. Investigate and audit the point of entry by attackers
  2. Quarantine to limit attacker’s access and decontaminate the infrastructure
  3. Plan and execute preventive actions for the future
53
of all Cyber attacks are targeted at small businesses
9%
only of cybercrimes are reported world-wide each year
68%
of breaches took months to discover
81%
of customers say they won't do business with a company who experienced a breach

Phase 1 [Audit and Breach Id]

After a thorough audit by our CSIRT (Computer Security Incident Response Team) we would identify ALL points of entry used by the attacker(s) as well as additional access points that they might have created in order to plan and execute phase 2 without leaving any doors open for the intruders to regain access.

We require the network infrastructure administrators to provide us with all information describing the topology, services and evidence that a breach has occured in order for our blue team to be able to completely assess the situation and narrow all points of access used by the attackers as well as eventual vulnerabilities in the systems and infrastructure that were used by the attacker.

 

Phase 2 [Scan, Seek, Sanitize]

After 100% certainty that the so called “doors” are known we can proceed by removing / “closing” them, by doing so quarantining the infrastructure affected by the attack. At this point and once our team has made sure that your infrastructure and systems are no longer accessible or penetrable by the attacker(s) we proceed with evaluation of data damage, backdoor/rootkits scanning and investigating on any possible modifications made by the attacker that must be repaired, removed or cleaned.

This phase is completed by our CSIRT once we make sure that any leftover software/code or modifications have been removed from your systems.

Phase 3 [Tactical Prevention Plan & Exec]

We do not only react by helping you in the emergency you have with your digital security, but we also make sure it never happens again.

Once we have completed Phases 1 and 2, our CSIRT would present you with kind of a prescription and a carefully tailored prevention plan specifically made to protect your systems and infrastructure from any potential threat similar to the one that was the occasion for you to use our service and to help you protect your organization from other threats or breaches. In the report and prescription plan you would find all the necessary steps that you and your system administrators should take in order to be 100% safe and not to ever need an incident response unit such as ours.

We strive to keep you and your business secure in the future.