cyber incidents: approaching the 3 most common threats

incident response

 Cyber incidents come in many different forms, from privacy breaches and extortion demands to denial of service attacks and malware outbreaks. The most common types of incidents our DFIR Team handles include ransomware attacks, business email compromise and data breaches. Each of these events requires a specialized technical approach.


Ransomware is a type of malware which encrypts your data until you pay a ransom for its return. Increasingly common, ransomware attacks can seriously impair your ability to operate and result in significant business interruption losses. If your systems are locked down, our incident response team will draw on their experience dealing with extortion demands, advise you of your options, investigate the extent of the infection, and help you decrypt and restore your systems and data.

Business email compromise

BEC happens when a fraudster gains access to your business email account, usually by using credentials they’ve found on the dark web. Once in, the attacker is able to reroute emails, fake invoices and more, most often resulting in lost funds through wire transfer fraud. If your business email account is compromised, our specialists will first attempt to halt the transfer of funds if we’ve been notified in time. We’ll also identify the origin of the compromise, remediate any systemic concerns, and help ensure your accounts are usable and secure again

What is a Data breach?

Almost all businesses collect or store data electronically, whether customer information, employee records, valuable intellectual property or something else. Not only is this data critical to running your business, it’s also often subject to privacy laws.

If you discover that your data has been lost or stolen, our incident response team will help you determine what led to the breach and whether you must – or should – notify customers and regulators. If notification is advised, we’ll help you work with all the necessary parties – from privacy lawyers to PR consultants – to make sure this process is a smooth one.

Leave a Comment