{"id":8173,"date":"2021-02-17T18:46:50","date_gmt":"2021-02-17T18:46:50","guid":{"rendered":"https:\/\/test.uploadbook.com\/syscom\/?page_id=8173"},"modified":"2021-11-08T18:35:06","modified_gmt":"2021-11-08T18:35:06","slug":"incident-response","status":"publish","type":"page","link":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/incident-response\/","title":{"rendered":"Incident Response"},"content":{"rendered":"<p>[vc_row el_class=&#8221;pt-80 pb-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text]<\/p>\n<h2>Incident Response &amp; Disaster Recovery<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-120 padding-box padding-full-left&#8221;][vc_column][vc_column_text el_class=&#8221;pb-50&#8243;]Incident response is the final piece of the threat defense lifecycle and is the methodology used to respond and manage cyberattacks quickly to accelerate the speed of disaster recovery. These attacks or data breaches can wreak havoc on your business, intellectual property, time, resources, and brand value. Our incident response team limits the damage in the shortest time possible, handles critical security incidents, and conducts analysis to resolve immediate and future cyberattacks.[\/vc_column_text][vc_single_image image=&#8221;8253&#8243; img_size=&#8221;syscom_image_center&#8221; alignment=&#8221;center&#8221; vc_none_hover_effect=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;pt-80 pb-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text]<\/p>\n<h2>Approach<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text el_class=&#8221;pb-50&#8243;]Our incident response team combines cutting-edge security tools and human expertise to identify attackers quickly, implement provisional measures such as containment, and eliminate them from your environment. The most effective incident response can limit the impact of an event, accelerate the speed of disaster recovery and reduce the cost of a security breach.[\/vc_column_text][vc_single_image image=&#8221;11384&#8243; img_size=&#8221;syscom_image_center&#8221; alignment=&#8221;center&#8221; vc_none_hover_effect=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;pt-80 pb-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text]<\/p>\n<h2>Flow<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-120 padding-box padding-full-left&#8221;][vc_column][vc_column_text el_class=&#8221;pb-50&#8243;]Our incident flow delivers an effective incident handling and response. We will identify each specific threat to determine whether an alert is a true threat and immediately assess the damage.[\/vc_column_text][vc_single_image image=&#8221;11386&#8243; img_size=&#8221;syscom_image_center&#8221; alignment=&#8221;center&#8221; vc_none_hover_effect=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;pt-120 pb-120 padding-box padding-full-left gray-d0-bg&#8221;][vc_column][vc_column_text]<\/p>\n<h2>What We Offer<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-80 content-columns3 padding-box padding-full-left gray-d0-bg hide-mobile&#8221;][vc_column][vc_row_inner equal_height=&#8221;yes&#8221; cms_row_inner_overflow=&#8221;&#8221; el_id=&#8221;rounded-icon-row desktop-view&#8221; el_class=&#8221;column-separator-full&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJyb3clMjByb3VuZGVkLWljb24tY29udGFpbmVyJTIwcm91bmRlZC1pY29uLXN0eWxlLTElMjIlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMmNvbC0xMiUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbiUyMGljb24tbXJlZCUyMGljb24taW5zdHJ1Y3Rpb24lMjIlM0UlMEElM0NzcGFuJTIwY2xhc3MlM0QlMjJyb3VuZGVkLWljb24taW5uZXIlMjIlM0UlM0MlMkZzcGFuJTNFJTBBJTNDJTJGc3BhbiUzRSUwQSUzQyUyRmRpdiUzRSUwQSUzQyUyRmRpdiUzRQ==[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJyb3clMjByb3VuZGVkLWljb24tY29udGFpbmVyJTIwcm91bmRlZC1pY29uLXN0eWxlLTElMjIlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMmNvbC0xMiUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbiUyMGljb24tbXJlZCUyMGljb24tZGV0ZWN0aW9uJTIyJTNFJTBBJTNDc3BhbiUyMGNsYXNzJTNEJTIycm91bmRlZC1pY29uLWlubmVyJTIyJTNFJTNDJTJGc3BhbiUzRSUwQSUzQyUyRnNwYW4lM0UlMEElM0MlMkZkaXYlM0UlMEElM0MlMkZkaXYlM0U=[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJyb3clMjByb3VuZGVkLWljb24tY29udGFpbmVyJTIwcm91bmRlZC1pY29uLXN0eWxlLTElMjIlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMmNvbC0xMiUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbiUyMGljb24tbXJlZCUyMGljb24tY29uc3VsdGluZyUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbi1pbm5lciUyMiUzRSUzQyUyRnNwYW4lM0UlMEElM0MlMkZzcGFuJTNFJTBBJTNDJTJGZGl2JTNFJTBBJTNDJTJGZGl2JTNF[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_row_inner cms_row_inner_overflow=&#8221;&#8221; el_class=&#8221;column-separator-full&#8221; el_id=&#8221;column-separator-full&#8221;][vc_column_inner el_class=&#8221;pb-20&#8243; width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4 class=\"light pb-20\">1.Preparation<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;pb-20&#8243; width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4 class=\"light pb-20\">2.Detection<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;pb-20&#8243; width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4 class=\"light pb-20\">3.Triage<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner cms_row_inner_overflow=&#8221;&#8221; el_class=&#8221;column-separator-full&#8221;][vc_column_inner el_class=&#8221;pb-20&#8243; width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<p class=\"s2\">Preparation is the key to a successful incident response. We will pre-determine the guidelines and our incident response team will effectively address a security incident.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;pb-20&#8243; width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<p class=\"s2\">We\u202futilize the leading technologies and tools to\u202fmonitor\u202fsecurity\u202fevents\u202fin order to better detect\u202falerts\u202fon\u202fsuspicious activities on\u202fdata, devices, and services.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;pb-20&#8243; width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<p class=\"s2\">We will perform alert triage to quickly identify if an alert should be dismissed or escalated and then we further\u202fanalyze\u202fthe\u202fdata\u202fcollected from\u202four tools and systems. This gives our experts a definitive understanding of what happened and when, who was affected, the extent of the attack, and how critical. With this information, we can plan the most effective response.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_mask_bg=&#8221;&#8221; row_arrow=&#8221;&#8221; el_class=&#8221;pb-30 content-columns3 padding-box padding-full-left gray-d0-bg display-mobile&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJyb3clMjByb3VuZGVkLWljb24tY29udGFpbmVyJTIwcm91bmRlZC1pY29uLXN0eWxlLTElMjIlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMmNvbC0xMiUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbiUyMGljb24tbXJlZCUyMGljb24taW5zdHJ1Y3Rpb24lMjIlM0UlMEElM0NzcGFuJTIwY2xhc3MlM0QlMjJyb3VuZGVkLWljb24taW5uZXIlMjIlM0UlM0MlMkZzcGFuJTNFJTBBJTNDJTJGc3BhbiUzRSUwQSUzQyUyRmRpdiUzRSUwQSUzQyUyRmRpdiUzRQ==[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_column_text]<\/p>\n<h4 class=\"light pb-20\">1.Preparation<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_column_text]<\/p>\n<p class=\"s2\">Preparation is the key to a successful incident response. We will pre-determine the guidelines and our incident response team will effectively address a security incident.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJyb3clMjByb3VuZGVkLWljb24tY29udGFpbmVyJTIwcm91bmRlZC1pY29uLXN0eWxlLTElMjIlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMmNvbC0xMiUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbiUyMGljb24tbXJlZCUyMGljb24tZGV0ZWN0aW9uJTIyJTNFJTBBJTNDc3BhbiUyMGNsYXNzJTNEJTIycm91bmRlZC1pY29uLWlubmVyJTIyJTNFJTNDJTJGc3BhbiUzRSUwQSUzQyUyRnNwYW4lM0UlMEElM0MlMkZkaXYlM0UlMEElM0MlMkZkaXYlM0U=[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_column_text]<\/p>\n<h4 class=\"light pb-20\">2.Detection<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner cms_row_inner_overflow=&#8221;&#8221;][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_column_text]<\/p>\n<p class=\"s2\">We\u202futilize the leading technologies and tools to\u202fmonitor\u202fsecurity\u202fevents\u202fin order to better detect\u202falerts\u202fon\u202fsuspicious activities on\u202fdata, devices, and services.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJyb3clMjByb3VuZGVkLWljb24tY29udGFpbmVyJTIwcm91bmRlZC1pY29uLXN0eWxlLTElMjIlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMmNvbC0xMiUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbiUyMGljb24tbXJlZCUyMGljb24tY29uc3VsdGluZyUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbi1pbm5lciUyMiUzRSUzQyUyRnNwYW4lM0UlMEElM0MlMkZzcGFuJTNFJTBBJTNDJTJGZGl2JTNFJTBBJTNDJTJGZGl2JTNF[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_column_text]<\/p>\n<h4 class=\"light pb-20\">3.Triage<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner cms_row_inner_overflow=&#8221;&#8221;][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_column_text]<\/p>\n<p class=\"s2\">We will perform alert triage to quickly identify if an alert should be dismissed or escalated and then we further\u202fanalyze\u202fthe\u202fdata\u202fcollected from\u202four tools and systems. This gives our experts a definitive understanding of what happened and when, who was affected, the extent of the attack, and how critical. With this information, we can plan the most effective response.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;content-columns3 padding-box padding-full-left gray-d0-bg hide-mobile&#8221;][vc_column][vc_row_inner equal_height=&#8221;yes&#8221; cms_row_inner_overflow=&#8221;&#8221; el_class=&#8221;column-separator-full&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJyb3clMjByb3VuZGVkLWljb24tY29udGFpbmVyJTIwcm91bmRlZC1pY29uLXN0eWxlLTElMjIlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMmNvbC0xMiUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbiUyMGljb24tbXJlZCUyMGljb24tcmVtZWRpYXRpb24lMjIlM0UlMEElM0NzcGFuJTIwY2xhc3MlM0QlMjJyb3VuZGVkLWljb24taW5uZXIlMjIlM0UlM0MlMkZzcGFuJTNFJTBBJTNDJTJGc3BhbiUzRSUwQSUzQyUyRmRpdiUzRSUwQSUzQyUyRmRpdiUzRQ==[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJyb3clMjByb3VuZGVkLWljb24tY29udGFpbmVyJTIwcm91bmRlZC1pY29uLXN0eWxlLTElMjIlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMmNvbC0xMiUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbiUyMGljb24tbXJlZCUyMGljb24tcmVjb3ZlcnklMjIlM0UlMEElM0NzcGFuJTIwY2xhc3MlM0QlMjJyb3VuZGVkLWljb24taW5uZXIlMjIlM0UlM0MlMkZzcGFuJTNFJTBBJTNDJTJGc3BhbiUzRSUwQSUzQyUyRmRpdiUzRSUwQSUzQyUyRmRpdiUzRQ==[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJyb3clMjByb3VuZGVkLWljb24tY29udGFpbmVyJTIwcm91bmRlZC1pY29uLXN0eWxlLTElMjIlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMmNvbC0xMiUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbiUyMGljb24tbXJlZCUyMGljb24tYnVzaW5lc3NfaW50ZWxsaWxsZW5nZSUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbi1pbm5lciUyMiUzRSUzQyUyRnNwYW4lM0UlMEElM0MlMkZzcGFuJTNFJTBBJTNDJTJGZGl2JTNFJTBBJTNDJTJGZGl2JTNF[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_row_inner cms_row_inner_overflow=&#8221;&#8221; el_class=&#8221;column-separator-full&#8221;][vc_column_inner el_class=&#8221;pb-20&#8243; width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4 class=\"light pb-20\">4.Response<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;pb-20&#8243; width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4 class=\"light pb-20\">5.Recovery<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;pb-20&#8243; width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4 class=\"light pb-20\">6.Post Incident Activity<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner cms_row_inner_overflow=&#8221;&#8221; el_class=&#8221;column-separator-full&#8221;][vc_column_inner el_class=&#8221;pb-20&#8243; width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<p class=\"s2\">With the analytical reviews and identification of threats, we recommend the best way to contain and remediate each threat. Our experts will determine whether to isolate a system from the network.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;pb-20&#8243; width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<p class=\"s2\">The final step in our security approach is recovery. If this step is not performed properly, your organization\u2019s entire investment in security tools will be for nothing. Our expertly managed recovery\/remediation restores systems back to normal preventing further compromise.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;pb-20&#8243; width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<p class=\"s2\">With the security threats contained and eradicated, our security operations team uses what we\u2019ve learned to complete\u202fan incident report and\u202fidentify preventative measures, such\u202fas policy\u202ftuning, configuration changes,\u202fand updating threat intelligence to prevent future incidents.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_mask_bg=&#8221;&#8221; row_arrow=&#8221;&#8221; el_class=&#8221;content-columns3 padding-box padding-full-left gray-d0-bg display-mobile&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJyb3clMjByb3VuZGVkLWljb24tY29udGFpbmVyJTIwcm91bmRlZC1pY29uLXN0eWxlLTElMjIlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMmNvbC0xMiUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbiUyMGljb24tbXJlZCUyMGljb24tcmVtZWRpYXRpb24lMjIlM0UlMEElM0NzcGFuJTIwY2xhc3MlM0QlMjJyb3VuZGVkLWljb24taW5uZXIlMjIlM0UlM0MlMkZzcGFuJTNFJTBBJTNDJTJGc3BhbiUzRSUwQSUzQyUyRmRpdiUzRSUwQSUzQyUyRmRpdiUzRQ==[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_column_text]<\/p>\n<h4 class=\"light pb-20\">4.Response<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_column_text]<\/p>\n<p class=\"s2\">With the analytical reviews and identification of threats, we recommend the best way to contain and remediate each threat. Our experts will determine whether to isolate a system from the network.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJyb3clMjByb3VuZGVkLWljb24tY29udGFpbmVyJTIwcm91bmRlZC1pY29uLXN0eWxlLTElMjIlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMmNvbC0xMiUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbiUyMGljb24tbXJlZCUyMGljb24tcmVjb3ZlcnklMjIlM0UlMEElM0NzcGFuJTIwY2xhc3MlM0QlMjJyb3VuZGVkLWljb24taW5uZXIlMjIlM0UlM0MlMkZzcGFuJTNFJTBBJTNDJTJGc3BhbiUzRSUwQSUzQyUyRmRpdiUzRSUwQSUzQyUyRmRpdiUzRQ==[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_column_text]<\/p>\n<h4 class=\"light pb-20\">5.Recovery<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner cms_row_inner_overflow=&#8221;&#8221;][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_column_text]<\/p>\n<p class=\"s2\">The final step in our security approach is recovery. If this step is not performed properly, your organization\u2019s entire investment in security tools will be for nothing. Our expertly managed recovery\/remediation restores systems back to normal preventing further compromise.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_raw_html]JTNDZGl2JTIwY2xhc3MlM0QlMjJyb3clMjByb3VuZGVkLWljb24tY29udGFpbmVyJTIwcm91bmRlZC1pY29uLXN0eWxlLTElMjIlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMmNvbC0xMiUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbiUyMGljb24tbXJlZCUyMGljb24tYnVzaW5lc3NfaW50ZWxsaWxsZW5nZSUyMiUzRSUwQSUzQ3NwYW4lMjBjbGFzcyUzRCUyMnJvdW5kZWQtaWNvbi1pbm5lciUyMiUzRSUzQyUyRnNwYW4lM0UlMEElM0MlMkZzcGFuJTNFJTBBJTNDJTJGZGl2JTNFJTBBJTNDJTJGZGl2JTNF[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_column_text]<\/p>\n<h4 class=\"light pb-20\">6.Post Incident Activity<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner cms_row_inner_overflow=&#8221;&#8221;][vc_column_inner el_class=&#8221;mb-20&#8243;][vc_column_text]<\/p>\n<p class=\"s2\">With the security threats contained and eradicated, our security operations team uses what we\u2019ve learned to complete\u202fan incident report and\u202fidentify preventative measures, such\u202fas policy\u202ftuning, configuration changes,\u202fand updating threat intelligence to prevent future incidents.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row row_mask_bg=&#8221;&#8221; row_arrow=&#8221;&#8221; el_class=&#8221;padding-box padding-top padding-top-gray-d0 padding-bottom gradient gradient-l hide-mobile&#8221; css=&#8221;.vc_custom_1622480267794{background-image: url(https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/Module-Security.jpeg?id=4461) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;pt-30per pb-30per section-mobile-bg&#8221; offset=&#8221;vc_col-md-6&#8243;][vc_column_text el_class=&#8221;mod_features block-text-with-link&#8221;]<\/p>\n<h2>Protect Your Business<\/h2>\n<p class=\"s1 white\">Comprehensive\u202fsecurity solutions\u202fhelp companies of all sizes keep every part of their business secure,\u202ftrusted\u202fand worry-free.\u202fOur experts will\u202fbe on your side to\u202fensure\u202fyour\u202fmost important resources are protected and business\u202frisks\u202fare minimized.<\/p>\n<p><a class=\"link white\" href=\"https:\/\/test.uploadbook.com\/syscom\/solutions\/it-security-solutions\/\">Learn More<\/a>[\/vc_column_text][vc_raw_html el_class=&#8221;button-panel&#8221;]JTNDZGl2JTIwY2xhc3MlM0QlMjJyb3clMjBuby1ndXR0ZXIlMjIlM0UlMEElM0NkaXYlMjBjbGFzcyUzRCUyMmNvbC14cy0xMiUyMGNvbC1zbS0xMiUyMGNvbC1tZC0xMiUyMGNvbC1sZy02JTIyJTNFJTBBJTNDYSUyMGhyZWYlM0QlMjJodHRwcyUzQSUyRiUyRnN5c2NvbWdzLmNvbSUyRmVuJTJGc2VydmljZXMlMkZtYW5hZ2VkLXNlY3VyaXR5JTJGbWFuYWdlZC1zb2Mtc2VydmljZSUyRiUyMiUyMGNsYXNzJTNEJTIyY21zLWJ1dHRvbiUyMHNxdWFyZWQlMjIlM0VNYW5hZ2VkJTIwU09DJTIwU2VydmljZSUzQyUyRmElM0UlMEElM0NhJTIwaHJlZiUzRCUyMmh0dHBzJTNBJTJGJTJGc3lzY29tZ3MuY29tJTJGZW4lMkZzZXJ2aWNlcyUyRm1hbmFnZWQtc2VjdXJpdHklMkZpbmNpZGVudC1yZXNwb25zZSUyRiUyMiUyMGNsYXNzJTNEJTIyY21zLWJ1dHRvbiUyMHNxdWFyZWQlMjIlM0VJbmNpZGVudCUyMFJlc3BvbnNlJTNDJTJGYSUzRSUwQSUzQ2ElMjBocmVmJTNEJTIyaHR0cHMlM0ElMkYlMkZzeXNjb21ncy5jb20lMkZlbiUyRnNlcnZpY2VzJTJGbWFuYWdlZC1zZWN1cml0eSUyRm1kci1tYW5hZ2VkLWRldGVjdGlvbi1hbmQtcmVzcG9uc2UlMkYlMjIlMjBjbGFzcyUzRCUyMmNtcy1idXR0b24lMjBzcXVhcmVkJTIyJTNFTURSJTNDJTJGYSUzRSUwQSUzQyUyRmRpdiUzRSUwQSUzQ2RpdiUyMGNsYXNzJTNEJTIyY29sLXhzLTEyJTIwY29sLXNtLTEyJTIwY29sLW1kLTEyJTIwY29sLWxnLTYlMjIlM0UlMEElM0NhJTIwaHJlZiUzRCUyMmh0dHBzJTNBJTJGJTJGc3lzY29tZ3MuY29tJTJGZW4lMkZzb2x1dGlvbnMlMkZpdC1zZWN1cml0eS1zb2x1dGlvbnMlMkZlbWFpbC1zZWN1cml0eSUyRiUyMiUyMGNsYXNzJTNEJTIyY21zLWJ1dHRvbiUyMHNxdWFyZWQlMjIlM0VFbWFpbCUyMFNlY3VyaXR5JTNDJTJGYSUzRSUwQSUzQ2ElMjBocmVmJTNEJTIyaHR0cHMlM0ElMkYlMkZzeXNjb21ncy5jb20lMkZlbiUyRnNvbHV0aW9ucyUyRml0LXNlY3VyaXR5LXNvbHV0aW9ucyUyRmVuZHBvaW50LXNlY3VyaXR5LW5nYXYtZWRyJTJGJTIyJTIwY2xhc3MlM0QlMjJjbXMtYnV0dG9uJTIwc3F1YXJlZCUyMiUzRUVuZHBvaW50JTIwU2VjdXJpdHklM0MlMkZhJTNFJTBBJTNDYSUyMGhyZWYlM0QlMjJodHRwcyUzQSUyRiUyRnN5c2NvbWdzLmNvbSUyRmVuJTJGc29sdXRpb25zJTJGaXQtc2VjdXJpdHktc29sdXRpb25zJTJGJTIyJTIwY2xhc3MlM0QlMjJjbXMtYnV0dG9uJTIwc3F1YXJlZCUyMiUzRUlUJTIwU2VjdXJpdHklMjBDb25zdWx0aW5nJTNDJTJGYSUzRSUwQSUzQyUyRmRpdiUzRSUwQSUzQyUyRmRpdiUzRQ==[\/vc_raw_html][\/vc_column][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-md-6&#8243;][vc_single_image image=&#8221;4461&#8243; img_size=&#8221;syscom_full_mobile&#8221; vc_none_hover_effect=&#8221;&#8221; vc_set_img_bg=&#8221;true&#8221; el_class=&#8221;img-mobile&#8221;][\/vc_column][\/vc_row][vc_row row_mask_bg=&#8221;&#8221; row_arrow=&#8221;&#8221; el_class=&#8221;padding-box padding-top padding-top-gray-d0 padding-bottom gradient gradient-l display-mobile&#8221; css=&#8221;.vc_custom_1622480278031{background-image: url(https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/Module-Security.jpeg?id=4461) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_col-md-6 vc_col-xs-12&#8243;][vc_single_image image=&#8221;4461&#8243; img_size=&#8221;syscom_full_mobile&#8221; vc_none_hover_effect=&#8221;&#8221; vc_set_img_bg=&#8221;true&#8221; el_class=&#8221;img-mobile&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243; el_class=&#8221;pt-30per pb-30per section-mobile-bg&#8221; offset=&#8221;vc_col-md-6 vc_col-xs-12&#8243;][vc_column_text el_class=&#8221;mod_features block-text-with-link&#8221;]<\/p>\n<h2>Protect Your Business<\/h2>\n<p class=\"s1 white\">Comprehensive\u202fsecurity solutions\u202fhelp companies of all sizes keep every part of their business secure,\u202ftrusted\u202fand worry-free.\u202fOur experts will\u202fbe on your side to\u202fensure\u202fyour\u202fmost important resources are protected and business\u202frisks\u202fare minimized.<\/p>\n<p><a class=\"link white\" href=\"https:\/\/test.uploadbook.com\/syscom\/solutions\/it-security-solutions\/\">Learn More<\/a>[\/vc_column_text][vc_raw_html el_class=&#8221;button-panel&#8221;]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row el_class=&#8221;padding-box padding-full-left home-intro hidden&#8221;][vc_column el_class=&#8221;custom-news&#8221;][vc_column_text]<\/p>\n<h2>News &amp;<br \/>\nResources<\/h2>\n<p>[\/vc_column_text][cms_latest_news categories_name=&#8221;News&#8221; cms_template=&#8221;cms_latest_news&#8211;layout-columns.php&#8221;][vc_column_text el_class=&#8221;block-text-with-link&#8221;]<a class=\"cms-button md mt-30\" href=\"https:\/\/test.uploadbook.com\/syscom\/company\/news-and-resources\/\">Learn More<\/a>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;padding-box padding-full-left columns-vertical-center&#8221;][vc_column width=&#8221;2\/3&#8243; el_class=&#8221;syscom-blockquote red-sym first-column vertical-center&#8221;][vc_column_text el_class=&#8221;block-text-link&#8221;]Incident response is the methodology used to respond and manage cyberattacks quickly to accelerate the speed of disaster recovery. Please contact us for more details.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;vertical-center&#8221;][vc_column_text el_class=&#8221;block-text-link&#8221;]<a class=\"cms-button md\" href=\"https:\/\/test.uploadbook.com\/syscom\/contact-us\/\">CONTACT US TODAY<\/a>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pt-5per padding-box padding-top padding-bottom footer-bg&#8221;][vc_column][vc_raw_html el_id=&#8221;footer-block&#8221;]JTNDJTIxLS0lMjBUSElTJTIwSVMlMjBBJTIwRk9PVEVSJTIwQkxPQ0slMjAtLSUzRQ==[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row el_class=&#8221;pt-80 pb-80 padding-box padding-full-left&#8221;][vc_column][vc_column_text] Incident Response &amp; Disaster Recovery [\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;pb-120 padding-box padding-full-left&#8221;][vc_column][vc_column_text el_class=&#8221;pb-50&#8243;]Incident response is the final piece of the threat defense lifecycle<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":8105,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Incident Response Service - SYSCOM GLOBAL SOLUTIONS<\/title>\n<meta name=\"description\" content=\"We provide managed IT security services &amp; solutions to help protect your most important assets - infrastructure, data, and people.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/incident-response\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Incident Response Service - SYSCOM GLOBAL SOLUTIONS\" \/>\n<meta property=\"og:description\" content=\"We provide managed IT security services &amp; solutions to help protect your most important assets - infrastructure, data, and people.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/incident-response\/\" \/>\n<meta property=\"og:site_name\" content=\"SYSCOM GLOBAL SOLUTIONS\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-08T18:35:06+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"60\" \/>\n<meta name=\"twitter:description\" content=\"false\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/incident-response\/\",\"url\":\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/incident-response\/\",\"name\":\"Incident Response Service - SYSCOM GLOBAL SOLUTIONS\",\"isPartOf\":{\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#website\"},\"datePublished\":\"2021-02-17T18:46:50+00:00\",\"dateModified\":\"2021-11-08T18:35:06+00:00\",\"description\":\"We provide managed IT security services & solutions to help protect your most important assets - infrastructure, data, and people.\",\"breadcrumb\":{\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/incident-response\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/incident-response\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/incident-response\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/test.uploadbook.com\/syscom\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Managed IT Security\",\"item\":\"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Incident Response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#website\",\"url\":\"https:\/\/test.uploadbook.com\/syscom\/en\/\",\"name\":\"Syscom Global Solutions\",\"description\":\"Introduce IT &amp; digital solutions and services by SYSCOM GLOBAL SOLUTIONS\",\"publisher\":{\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/test.uploadbook.com\/syscom\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#organization\",\"name\":\"syscom global solutions\",\"url\":\"https:\/\/test.uploadbook.com\/syscom\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/logo_final.png\",\"contentUrl\":\"https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/logo_final.png\",\"width\":204,\"height\":46,\"caption\":\"syscom global solutions\"},\"image\":{\"@id\":\"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Incident Response Service - SYSCOM GLOBAL SOLUTIONS","description":"We provide managed IT security services & solutions to help protect your most important assets - infrastructure, data, and people.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/incident-response\/","og_locale":"en_US","og_type":"article","og_title":"Incident Response Service - SYSCOM GLOBAL SOLUTIONS","og_description":"We provide managed IT security services & solutions to help protect your most important assets - infrastructure, data, and people.","og_url":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/incident-response\/","og_site_name":"SYSCOM GLOBAL SOLUTIONS","article_modified_time":"2021-11-08T18:35:06+00:00","twitter_card":"summary_large_image","twitter_title":"60","twitter_description":"false","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/incident-response\/","url":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/incident-response\/","name":"Incident Response Service - SYSCOM GLOBAL SOLUTIONS","isPartOf":{"@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#website"},"datePublished":"2021-02-17T18:46:50+00:00","dateModified":"2021-11-08T18:35:06+00:00","description":"We provide managed IT security services & solutions to help protect your most important assets - infrastructure, data, and people.","breadcrumb":{"@id":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/incident-response\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/incident-response\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/incident-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/test.uploadbook.com\/syscom\/en\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/"},{"@type":"ListItem","position":3,"name":"Managed IT Security","item":"https:\/\/test.uploadbook.com\/syscom\/en\/services\/managed-security\/"},{"@type":"ListItem","position":4,"name":"Incident Response"}]},{"@type":"WebSite","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#website","url":"https:\/\/test.uploadbook.com\/syscom\/en\/","name":"Syscom Global Solutions","description":"Introduce IT &amp; digital solutions and services by SYSCOM GLOBAL SOLUTIONS","publisher":{"@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/test.uploadbook.com\/syscom\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#organization","name":"syscom global solutions","url":"https:\/\/test.uploadbook.com\/syscom\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/logo\/image\/","url":"https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/logo_final.png","contentUrl":"https:\/\/test.uploadbook.com\/syscom\/wp-content\/uploads\/2020\/12\/logo_final.png","width":204,"height":46,"caption":"syscom global solutions"},"image":{"@id":"https:\/\/test.uploadbook.com\/syscom\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/pages\/8173"}],"collection":[{"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/comments?post=8173"}],"version-history":[{"count":28,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/pages\/8173\/revisions"}],"predecessor-version":[{"id":11389,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/pages\/8173\/revisions\/11389"}],"up":[{"embeddable":true,"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/pages\/8105"}],"wp:attachment":[{"href":"https:\/\/test.uploadbook.com\/syscom\/en\/wp-json\/wp\/v2\/media?parent=8173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}