The impact to some businesses of security incidents can be catastrophic, others suffer relatively little impact, we help client understand the impact of potential worst case outcomes and define plans in advance to manage unexpected incidents.
The more obvious information security incident types [e.g. virus infections, information leakage, etc] have very obvious and public consequences. Other types of incident are often best handled in the most discreet manner possible [e.g. employee misuse, competitor targeted attack, director profile, etc.
Our experience in dealing with large scale security incidents on critical systems enables us to manage the incident from discovery through to recovery to business as usual, analysing the causes, 'recovery' and building an appropriate action plan to prevent reoccurrence.
We can act on our clients behalf to investigate and gather evidence of a suspected incident, forensic analysis can be utilised to discover and retain evidence that may be needed to protect the best interests of the company.
We provide clients with an appropriate methodology for Incident Response, forming and Managing an Incident Response Team. We are often retained to be a part of the incident or crisis management team and lead the information security components of any investigations. We provide proactive Incident detection and assessment services to identify an early warning signs that a client is being targeted. Our consultants can respond at short notice to assist in the management of serious incidents
Infosec Partners performs exposure assessments and helps organisations define plans for disaster recovery, we are experienced in helping to determine maximum permissible downtime for each service, defining recovery time and recovery point objectives. We develop plans whilst evaluating business continuity arrangements and we assist the organisation with planned and unplanned disaster recovery testing.
Many business conduct investigation without the correct process or knowledge to preserve the evidence they are reviewing, our advisors are trained to usilise advanced data recovery and forensic investigation techniques in audio, video, computer and document discovery. We have expertise in the recovery of deleted / corrupt and encrypted data, we recover passwords and keys used when they have been accidentally or maliciously destroyed. We utilise secure encrypted data storage systems and have staff that can appear as expert witnesses on clients behalf
We perform systems monitoring and provide proactive surveillance systems, we can assist with Counter surveillance strategies, Evidence gathering and presentation, Covert investigation analysis and Personnel Interviews. We have staff dedicated to monitoring and protection against stalking and can provide confidence that all instances are investigated and recorded