incident-response-policy

1
80 Broad Street, 5th Floor New York, NY 10004 www.2secure.biz [email protected] Tel: 646-666-9601 Fax: 718-942-5355 Date: 4/1/2014 Case Study: INCIDENT RESPONSE POLICY Preface: The purpose of incident response policy is to have a process in place that will allow an organ- ization to handle events that are preventing the company from operating normally. These events may be Viruses, Malware, network intrusions and other general systems failures’. The Case: One of our clients, a Software development company wanted to establish such a policy that will allow them to handle incidents efficiently & effectively. This process included the following parts: 1. Event Documentation: such as date/time, source, severity. 2. Evidence Preservation: screenshots, logs & emails. 3. Alerting System. 4. Damage Assessment. 5. Review responses and update process and other policies accordingly. This policy, is now governs the client’s incident response to events affecting computerized and electronic communication information resources, such as intrusions, data misuse & Hardware/Software failures. In Conclusion: The majority of companies are ignoring the risk of not having such policy, intrusions do happen, the question is when and how would an organization react to such an incident. About 2Secure Corp 2Secure is a Cyber Security firm that takes a PROACTIVE approach to solving network problems. We provide the right tools to fix problems the first time around – in fact, we guarantee it!

Upload: yigal-behar

Post on 07-Aug-2015

11 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Incident-Response-Policy

80 Broad Street, 5th Floor New York, NY 10004 www.2secure.biz [email protected] Tel: 646-666-9601 Fax: 718-942-5355

Date: 4/1/2014

Case Study: INCIDENT RESPONSE POLICY Preface: The purpose of incident response policy is to have a process in place that will allow an organ-ization to handle events that are preventing the company from operating normally. These events may be Viruses, Malware, network intrusions and other general systems failures’. The Case: One of our clients, a Software development company wanted to establish such a policy that will allow them to handle incidents efficiently & effectively. This process included the following parts: 1. Event Documentation: such as date/time, source, severity. 2. Evidence Preservation: screenshots, logs & emails. 3. Alerting System. 4. Damage Assessment. 5. Review responses and update process and other policies accordingly. This policy, is now governs the client’s incident response to events affecting computerized and electronic communication information resources, such as intrusions, data misuse & Hardware/Software failures. In Conclusion: The majority of companies are ignoring the risk of not having such policy, intrusions do happen, the question is when and how would an organization react to such an incident. About 2Secure Corp 2Secure is a Cyber Security firm that takes a PROACTIVE approach to solving network problems. We provide the right tools to fix problems the first time around – in fact, we guarantee it!