Incident Response
Incident Response
Is your organization facing unexpected events in your IT environment, such as workstation lockdown, security breach, no more access to your data, a possible data breach, ransomware or cybersecurity attack? At your request, NFIR takes immediate action with an Incident Response team.
NFIR is available to its clients 24/7 to map out and resolve any security incident. Our Incident Response team makes every effort to be at your location within three hours. The goal of the Incident Response team is to minimize the impact of the cyber incident as quickly as possible so that your organization’s continuity is no longer at risk.
What is Incident Response (IR)
Incident response (IR) refers to the process an organization follows to respond to a security incident, such as a cyber attack, data breach or other undesired event that compromises the confidentiality, integrity or availability of information or systems.
What is the purpose of Incident Response (IR).
The goal of incident response is to minimize the impact of an incident, limit damage, restore normal operations as quickly as possible and prevent future incidents
NFIR's approach to Incident Response
In conducting the security incident investigation, NFIR works according to the Incident Response procedures of NIST and SANS to conduct thorough and reliable investigations. In addition, experience and analytical skills are at the basis of every solved security incident. If your organisation already has Incident Response procedures, then NFIR follows those procedures.
During the Incident Response process, NFIR pays attention to the following three processes
- Triage: this step aims to identify the source(s) and affected devices and/or systems, use it to prioritize and determine the plan of action for further investigation. At the same time, data is safeguarded in a forensic way for possible further investigation.
- Containment: This process involves restoring affected devices and/or systems and verifying security so that normal operations can resume.
- Post-incident activities.: when the incident is resolved, a forensic investigation report is prepared. The report proposes solutions to prevent a similar event from occurring in the future. NFIR can also support and/or advise in the communication towards the Data Protection Authority, attorney at law and other parties involved.
We use the existing knowledge and skills of the client in the Triage phase. The Incident Response team starts on site and creates a plan of action. Thanks to our procedures and checklists, we can take action quickly and minimise the negative effects of the cyber security incident. During this entire investigation, NFIR will work in a forensic responsible manner in order to be able to produce a forensic report later in the process. If you have suspicions of culpability or recoverability against a natural or legal person, you can also engage us to conduct an investigation. Our reports are legally valid. You can use the NFIR report as evidence in a court case or for a report to the (Dutch) Data Protection Authority (DPA) in the event of a data breach.
The Incident Response Team of NFIR
NFIR’s team consists of digital forensic investigators, ethical hackers and team leads who all have Incident Response experience. After notification of the security incident, a team is put together that expresses its opinion. The size of the team depends on the type of cyber incident. Of course, all members of the team will work forensically during this process.
Preventing security incidents is obviously better than curing them. We are convinced that companies benefit above all from good preventive measures, both technically and in terms of awareness. For this reason, NFIR conducts pentesting out, we provide Security Awareness services and offer a package of various services through the Cyber Security IR retainer.
Incident Response Plan
I have an incident. What should I do? Know what to expect in the case of a IT security incident. Read more about the Incident Response process.
CERT
NFIR is a Computer Emergency Response Team (CERT). CERT is a registered trademark of Carnegie Mellon University and was awarded to NFIR in January 2020, after NFIR was found to have met all the required requirements. The allocation is based on the work carried out by NFIR, but also on the parties with which NFIR cooperates.
NFIR’s Incident Response team is deployed in cooperation with and for private individuals, SMEs, government bodies, multinationals, educational institutions and non-profit organizations.
As a CERT, NFIR is one of the major organizations involved in combating cyber incidents, such as the NCSC, the IBD, the Ministry of Defence, telecom organizations and banks. Among these CERTs, there is an overriding confidence in a sector by speaking the same language, which makes cooperation possible.
ISO-27001, ISO-27002 and ISO-9001
NFIR holds an ISO-27001, ISO-27002 and an ISO-9001 certification. These international ISO standards set requirements for information security, aiming to ensure the confidentiality, availability and integrity of data. NFIR has been reviewed by BSI for implementation and compliance with these standards. With its certification for the ISO-27001 standard, NFIR proves that it deals with data in a careful and confidential manner and that it controls the information processes within the organisation. With the addition of the ISO-9001 certification, NFIR demonstrates our ability to provide the services that meet information security and quality requirements and desires of our customers.
The scope of the certification includes limiting the consequential damage of cyber incidents and increasing the digital resilience of organizations through response and preventive IT security services.
What is the difference between proactive and reactive cybersecurity?
The crucial distinction between proactive and reactive cybersecurity is in the timing and approach relative to threats. Proactive cyber security focuses primarily on preventing attacks before they happen. This is done through continuous monitoring, thorough security assessments and implementation of preventive measures. In contrast, reactive cyber security responds to incidents after they have already occurred through detection, containment and remediation activities.
Examples of Proactive and Reactive Measures
Proactive measures include vulnerability assessments, penetration testing (pen testing), training focused on security awareness and threat hunting (actively looking for potential threats). These efforts aim to identify and address security weaknesses before malicious actors can exploit them.
Reactive measures, on the other hand, include incident response (responding to incidents), digital forensics (digital forensics), malware analysis (analyzing malicious software) and remediation processes that kick in as soon as a breach is detected.
Can I always contact NFIR to get help in case of an IT-Security incident?
Yes, we are available 24/7 for SMEs, multinationals, government bodies, educational institutions and non-profit organisations. Within three hours, an incident response (CERT) team is present at every location in the Netherlands (Wadden Islands excluded).
What are the most common types of IT security incidents that NFIR encounters in Incident Response processes?
Of all the IT security incidents handled by NFIR, the most common are compromised (e-mail) accounts and attacks on vulnerable systems that offered insufficient resistance due to a lack of software updates and security. If hackers gain unauthorized access to systems, this usually leads to data breaches, the installation of ransomware and various types of malware such as crypto miners.
Common types of incidents and response that the Incident Response team assists with.
- Malware infections
- Ransomware attacks
- Data breaches
- Denial-of-Service (DoS/DDoS) attacks.
- Insider Threats
- Phishing and Social Engineering
- Cloud Security Incident Response
- OT/ICS Incident Response
What steps does an Incident Response process usually consist of?
The aim of the incident response team is to minimise the impact of the cyber incident as quickly as possible so that the continuity of your organisation is no longer at stake.
- Please contact NFIR’s Computer Emergency Response Team directly (088-133 0700)
- The CERT takes action. All necessary equipment is packed and within 3 hours the CERT is on site
- On site, the intake is conducted with all stakeholders to gather all available information about the incident.
- After granting the order, triage on the affected systems will be started.
- As soon as it is clear which systems have been affected or need further investigation, data will be secured according to a digital forensic procedure.
- In the containment phase, the affected systems are restored and security is verified to prevent a recurrence of the incident
- In the post-incident phase, the secured data is further digitally forensically examined. As many answers as possible are given to the research questions and the subject matter of the research. All findings and recommendations will be included in a report that will be delivered at the conclusion of the incident. This report can be used for internal and external purposes (such as supervisors and for legal proceedings).
What does an Incident Response team actually consist of?
NFIR’s CERT consists of:
- digital forensic investigators,
- ethical hackers
- team leads
all of whom have experience in incident response. After notification of the security incident, a team is put together that expresses its opinion. The size of the team depends on the type of cyber incident. Of course, all members of the team will work forensically during this process.
What is the impact of ransomware in my organization?
The number of ransomware attacks in the Netherlands is large and even increasing. In a recent survey, nearly three-quarters of Dutch companies surveyed said they would be hit by a ransomware attack by 2021. Only slightly more than a third said they had a cybersecurity strategy ready. This is while the impact of a ransomware attack on your business or organization is enormous. Your business operations are severely hampered or even made impossible. Trade secrets (can) be resold and data leaked. Your external partners no longer trust your organization and take a wait-and-see attitude. And don’t think “that won’t happen to us,” because it can happen to anyone. From large companies and organizations to SMEs employing 20 people.
Read the full article: What impact does a ransomware attack have on my organization?
Is there always a digital forensic investigation as part of Incident Response
This is not necessary in all cases, but often the client wants to know the extent of the incident and supervisors ask questions that can be answered by conducting an investigation. In all cases, NFIR is obliged to provide a report.
Does NFIR have the right forensic equipment?
The Incident Response team is always provided with the right digital forensic equipment to serve the clients directly on location. NFIR continuously invests in fast, reliable and leading equipment and tooling that allows multiple Incident Response teams to operate simultaneously.
Incident Response Plan
Know what to expect in the event of an IT security incident. Read more about the Incident Response plan.
Help with the legal and communications jungle after a cyber incident
When a cyber incident breaches your organization’s digital fortress, the impact does not manifest itself solely in technical disruptions. A crucial, often underestimated, domain includes the complex legal and communications aftermath. This is where NFIR positions itself as your strategic partner, reaching beyond mere technical incident handling. We understand that navigating
Parallel to this is the need for a thoughtful and effective communications strategy during and after an incident. NFIR supports you in establishing and implementing clear protocols for
About NFIR
We stand for communicating in clear language with our customers. In this way we also report our findings. In addition, we aspire to the ‘numbers tell the tale’ approach, which enables us to help you in a targeted way by means of various types of research. The approach also includes further development of our services. As a result, our services keep in line with changing practice.
NFIR stands for offering technical and organisational support, security services and training. With our knowledge and experience we can provide you with technical advice and advise you on the procedures and processes of information security. Enabling NFIR helps you to increase the resilience of your organisation’s cyber security in several areas.