Incident Response

Is your organization facing unexpected events in your IT environment, such as workstation lockdown, security breach, no more access to your data, a possible data breach, ransomware or cybersecurity attack?
NFIR beeldmerk kleur
NFIR beeldmerk kleur

Incident Response

Is your organization facing unexpected events in your IT environment, such as workstation lockdown, security breach, no more access to your data, a possible data breach, ransomware or cybersecurity attack?

Is your organization facing unexpected events in your IT environment, such as workstation lockdown, security breach, no more access to your data, a possible data breach, ransomware or cybersecurity attack? At your request, NFIR takes immediate action with an Incident Response team.

NFIR is available to its clients 24/7 to map out and resolve any security incident. Our Incident Response team makes every effort to be at your location within three hours. The goal of the Incident Response team is to minimize the impact of the cyber incident as quickly as possible so that your organization’s continuity is no longer at risk.

What is Incident Response (IR)

Incident response (IR) refers to the process an organization follows to respond to a security incident, such as a cyber attack, data breach or other undesired event that compromises the confidentiality, integrity or availability of information or systems.

What is the purpose of Incident Response (IR).

The goal of incident response is to minimize the impact of an incident, limit damage, restore normal operations as quickly as possible and prevent future incidents

NFIR's approach to Incident Response

In conducting the security incident investigation, NFIR works according to the Incident Response procedures of NIST and SANS to conduct thorough and reliable investigations. In addition, experience and analytical skills are at the basis of every solved security incident. If your organisation already has Incident Response procedures, then NFIR follows those procedures.

During the Incident Response process, NFIR pays attention to the following three processes

  1. Triage: this step aims to identify the source(s) and affected devices and/or systems, use it to prioritize and determine the plan of action for further investigation. At the same time, data is safeguarded in a forensic way for possible further investigation.
  2. Containment: This process involves restoring affected devices and/or systems and verifying security so that normal operations can resume.
  3. Post-incident activities.: when the incident is resolved, a forensic investigation report is prepared. The report proposes solutions to prevent a similar event from occurring in the future. NFIR can also support and/or advise in the communication towards the Data Protection Authority, attorney at law and other parties involved.

We use the existing knowledge and skills of the client in the Triage phase. The Incident Response team starts on site and creates a plan of action. Thanks to our procedures and checklists, we can take action quickly and minimise the negative effects of the cyber security incident. During this entire investigation, NFIR will work in a forensic responsible manner in order to be able to produce a forensic report later in the process. If you have suspicions of culpability or recoverability against a natural or legal person, you can also engage us to conduct an investigation. Our reports are legally valid. You can use the NFIR report as evidence in a court case or for a report to the (Dutch) Data Protection Authority (DPA) in the event of a data breach.

The Incident Response Team of NFIR

NFIR’s team consists of digital forensic investigators, ethical hackers and team leads who all have Incident Response experience. After notification of the security incident, a team is put together that expresses its opinion. The size of the team depends on the type of cyber incident. Of course, all members of the team will work forensically during this process.

Preventing security incidents is obviously better than curing them. We are convinced that companies benefit above all from good preventive measures, both technically and in terms of awareness. For this reason, NFIR conducts pentesting out, we provide Security Awareness services and offer a package of various services through the Cyber Security IR retainer.

Incident Response Plan

I have an incident. What should I do? Know what to expect in the case of a IT security incident. Read more about the Incident Response process.

CERT

NFIR is a Computer Emergency Response Team (CERT). CERT is a registered trademark of Carnegie Mellon University and was awarded to NFIR in January 2020, after NFIR was found to have met all the required requirements. The allocation is based on the work carried out by NFIR, but also on the parties with which NFIR cooperates.

NFIR’s Incident Response team is deployed in cooperation with and for private individuals, SMEs, government bodies, multinationals, educational institutions and non-profit organizations.
As a CERT, NFIR is one of the major organizations involved in combating cyber incidents, such as the NCSC, the IBD, the Ministry of Defence, telecom organizations and banks. Among these CERTs, there is an overriding confidence in a sector by speaking the same language, which makes cooperation possible.

ISO-27001, ISO-27002 and ISO-9001

NFIR holds an ISO-27001, ISO-27002 and an ISO-9001 certification. These international ISO standards set requirements for information security, aiming to ensure the confidentiality, availability and integrity of data. NFIR has been reviewed by BSI for implementation and compliance with these standards. With its certification for the ISO-27001 standard, NFIR proves that it deals with data in a careful and confidential manner and that it controls the information processes within the organisation. With the addition of the ISO-9001 certification, NFIR demonstrates our ability to provide the services that meet information security and quality requirements and desires of our customers.

The scope of the certification includes limiting the consequential damage of cyber incidents and increasing the digital resilience of organizations through response and preventive IT security services.

The crucial distinction between proactive and reactive cybersecurity is in the timing and approach relative to threats. Proactive cyber security focuses primarily on preventing attacks before they happen. This is done through continuous monitoring, thorough security assessments and implementation of preventive measures. In contrast, reactive cyber security responds to incidents after they have already occurred through detection, containment and remediation activities.

Examples of Proactive and Reactive Measures

Proactive measures include vulnerability assessments, penetration testing (pen testing), training focused on security awareness and threat hunting (actively looking for potential threats). These efforts aim to identify and address security weaknesses before malicious actors can exploit them.

Reactive measures, on the other hand, include incident response (responding to incidents), digital forensics (digital forensics), malware analysis (analyzing malicious software) and remediation processes that kick in as soon as a breach is detected.

Yes, we are available 24/7 for SMEs, multinationals, government bodies, educational institutions and non-profit organisations. Within three hours, an incident response (CERT) team is present at every location in the Netherlands (Wadden Islands excluded).

Of all the IT security incidents handled by NFIR, the most common are compromised (e-mail) accounts and attacks on vulnerable systems that offered insufficient resistance due to a lack of software updates and security. If hackers gain unauthorized access to systems, this usually leads to data breaches, the installation of ransomware and various types of malware such as crypto miners.

Common types of incidents and response that the Incident Response team assists with.

  • Malware infections
  • Ransomware attacks
  • Data breaches
  • Denial-of-Service (DoS/DDoS) attacks.
  • Insider Threats
  • Phishing and Social Engineering
  • Cloud Security Incident Response
  • OT/ICS Incident Response

The aim of the incident response team is to minimise the impact of the cyber incident as quickly as possible so that the continuity of your organisation is no longer at stake.

  1. Please contact NFIR’s Computer Emergency Response Team directly (088-133 0700)
  2. The CERT takes action. All necessary equipment is packed and within 3 hours the CERT is on site
  3. On site, the intake is conducted with all stakeholders to gather all available information about the incident.
  4. After granting the order, triage on the affected systems will be started.
  5. As soon as it is clear which systems have been affected or need further investigation, data will be secured according to a digital forensic procedure.
  6. In the containment phase, the affected systems are restored and security is verified to prevent a recurrence of the incident
  7. In the post-incident phase, the secured data is further digitally forensically examined. As many answers as possible are given to the research questions and the subject matter of the research. All findings and recommendations will be included in a report that will be delivered at the conclusion of the incident. This report can be used for internal and external purposes (such as supervisors and for legal proceedings).

NFIR’s CERT consists of:

  • digital forensic investigators,
  • ethical hackers
  • team leads

all of whom have experience in incident response. After notification of the security incident, a team is put together that expresses its opinion. The size of the team depends on the type of cyber incident. Of course, all members of the team will work forensically during this process.

The number of ransomware attacks in the Netherlands is large and even increasing. In a recent survey, nearly three-quarters of Dutch companies surveyed said they would be hit by a ransomware attack by 2021. Only slightly more than a third said they had a cybersecurity strategy ready. This is while the impact of a ransomware attack on your business or organization is enormous. Your business operations are severely hampered or even made impossible. Trade secrets (can) be resold and data leaked. Your external partners no longer trust your organization and take a wait-and-see attitude. And don’t think “that won’t happen to us,” because it can happen to anyone. From large companies and organizations to SMEs employing 20 people.

Read the full article: What impact does a ransomware attack have on my organization?

This is not necessary in all cases, but often the client wants to know the extent of the incident and supervisors ask questions that can be answered by conducting an investigation. In all cases, NFIR is obliged to provide a report.

The Incident Response team is always provided with the right digital forensic equipment to serve the clients directly on location. NFIR continuously invests in fast, reliable and leading equipment and tooling that allows multiple Incident Response teams to operate simultaneously.

When a cyber incident breaches your organization’s digital fortress, the impact does not manifest itself solely in technical disruptions. A crucial, often underestimated, domain includes the complex legal and communications aftermath. This is where NFIR positions itself as your strategic partner, reaching beyond mere technical incident handling. We understand that navigating legal obligations after an incident – think about the meticulous interpretation and prompt compliance with notification obligations such as the AVG/GDPR and industry-specific regulations – is of existential importance. Our expertise ensures that your organization not only complies with formal requirements, but does so in a way that minimizes potential legal complications.

Parallel to this is the need for a thoughtful and effective communications strategy during and after an incident. NFIR supports you in establishing and implementing clear protocols for internal communications so that employees and internal stakeholders are timely and accurately informed, which is essential for maintaining trust and operational continuity. For critical external communications to customers, the press and regulatory bodies, we provide strategic advice and operational support to communicate transparently without risking unnecessary reputational damage. In the heat of crisis communications, NFIR stands alongside you to manage the narrative, debunk rumors and restore trust. Where specialized legal expertise is required, NFIR facilitates seamless interaction with reputable legal experts within our network so that your organization acts legally sound at all times. Ultimately, protecting and restoring your public image is invaluable. NFIR seamlessly integrates public relations and reputation management into our incident response approach, with the goal of mitigating the long-term effects of the incident on your brand and implementing a strategy for recovery that demonstrates transparency and accountability. Through this integrated legal and communications approach, NFIR ensures a response that is not only technically adequate, but also legally robust and communicatively effective, significantly reducing the overall impact of the cyber incident on your organization.

We stand for communicating in clear language with our customers. In this way we also report our findings. In addition, we aspire to the ‘numbers tell the tale’ approach, which enables us to help you in a targeted way by means of various types of research. The approach also includes further development of our services. As a result, our services keep in line with changing practice.

NFIR stands for offering technical and organisational support, security services and training. With our knowledge and experience we can provide you with technical advice and advise you on the procedures and processes of information security. Enabling NFIR helps you to increase the resilience of your organisation’s cyber security in several areas.

More information

SECURITY INCIDENT BIJ UW ORGANISATIE?

De volgende 30 minuten zijn van cruciaal belang​!

De eerste 30 minuten na een cyber security incident zijn cruciaal, omdat een snelle en adequate reactie de schade kan beperken. Daarnaast kan verdere verspreiding van de aanval worden voorkomen en kan essentieel bewijsmateriaal veiliggesteld worden voor nader onderzoek.

Ons Computer Emergency Response Team (CERT) staat 24/7 klaar om bedrijven en organisaties te ondersteunen bij IT-beveiligingsincidenten.

SECURITY INCIDENT AT YOUR ORGANIZATION?

The next 30 minutes are crucial!

The first 30 minutes after a cyber security incident are crucial because a quick and adequate response can limit the damage. In addition, further spread of the attack can be prevented and essential evidence can be secured for further investigation.

Our Computer Emergency Response Team (CERT) is available 24/7 to support businesses and organizations during IT security incidents.