Incident Response
The primary goal of incident response is to effectively remove a threat from the organization’s computing environment, while minimizing damages and restoring normal operations as quickly as possible. Talus provides Emergency Incident Response Services for reported network security breach. Talus will provide management support and communications, empowering your executives to make the right business decisions related to response actions. Talus follows industry standard forensic procedures to collect, preserve, and analyze evidence in accordance with your objectives. This includes a variety of techniques such as log analysis, network and systems forensics, advanced malware analysis, and security intelligence to determine the root cause, timeline, and extent of the incident. The conclusion of the incident will be followed up with a detailed and comprehensive incident report of the investigations with recommendations for proactive remediation of issues uncovered.
- Data theft, including sensitive personal information, e-mail, and documents
- Theft of funds, including bank access, credit card, and wire fraud
- Extortion
- Unauthorized access to computing resources
- Presence of malware, including remote access tools and spyware
- Investigate
- Determine the initial attack vector
- Determine malware and tools used
- Determine what systems were affected, and how
- Determine what the attacker accomplished (damage assessment)
- Determine if the incident is ongoing
- Establish the time frame of the incident
- Remediate
- Digital Forensics
- Log Analysis