Let us test your Incident Response Plan!
A couple of important questions: When do you want your management team to make the first call of their career to notify your customers? During a live incident, or in a scenario test? Wouldn’t it be better to have that debate when we’re not in a panic?
More importantly: Do you want to figure this out on your own, or let people with decades of experience help point you in the right direction?
And we’re experienced:
The first incident contained by our founder and managing partner, Dan Hadaway, was in 1988, when the human resources person in his company fired six people for using e-mail inappropriately. We’ve counted that he has been involved in at least 160 incident responses since founding his firm in 2000. (About one per month on average.)
Our lead technical auditor, Sean Waugh, has been knee-deep in Managed Security Services at infotex since 2006. He has helped take down phishing sites, find and remove malware, react to DDoS attacks, and lead forensics investigations.
The rest of our team is indeed in the business of responding to incidents, and we also have proactive relationships with digital forensics investigators, law firms, and public relations firms.
If you find yourself in the middle of a great big oops, we can help.
But NOW IS THE TIME to create processes so that you won’t need our help!
We have helped banks, credit unions, and healthcare institutions develop and test their Incident Response Plans since 2000, when we started our firm. Our managed security services put us in a unique position as auditors.
The stakes are now very high. For example, Target reported losses of $111 million dollars in the quarter following the quarter following their huge data breach. Hospitals and healthcare organizations are not only losing reputation, but they’re also susceptible to HHS fines of up to $1.20 million per incident.
Not only will we lead your Incident Response Team through a sound, mature tabletop test, but we will help you develop a tabletop test process, so you can continue testing on your own and without the help of a third party. And though you must be very careful when implementing functional incident response testing, we have experience in many different attack vectors including DDoS attacks, malware, and social engineering.
So if your regulator or auditor has required you to start testing your Incident Response Program, or if you just simply want to do the right thing for your shareholders and get out ahead of the game, consider hiring seasoned professionals with the unique experience of infotex!
Call us at (800) 466-9939 for a quote! Or click here for other options.
One Response to “”
Another awareness poster for YOUR customers (and users). Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your office.
Intelligence agencies from five nations contributed to the new advisory… An article review. For the first time, the cybersecurity divisions of the nations in the “Five Eyes” alliance (The United States, United Kingdom, Canada, Australia and New Zealand) have released a joint advisory concerning incident response. The report, available here, does not provide a complete […]
PRESS RELEASE – FOR IMMEDIATE RELEASE BUSINESS NEWS NEW EMPLOYEE FOR INFOTEX infotex has just hired Nathan Harrell, to be a new Engagement Coordinator to assist with all communications between both current and prospective Clients. “We’re really excited to have Nate joining the team to help us keep the channels of communication open!” says Bryan […]
A Webinar-Movie Short Back by popular demand! Our Board Awareness Training program continues with this movie, entitled Vulnerability Management for Directors, that can be presented directly to your board of directors.
Nearly half of all companies expect a security issue due to telecommuting… An article review. A few months ago we discussed a warning from the Department of Homeland Security regarding hackers taking advantage of the business disruptions caused by COVID-19, and according to an article shared with us by our friend Wes Pollard it appears […]