A post-breach analysis is the first step in finding the causes of an IT system security incident. If you suspect that your organisation’s cyber security has been breached and you want to know what methods the hacker used and which part of the infrastructure was affected, we will help you gather evidence.
The analysis includes, among others:
- locating the IP address from which the breach occurred,
- finding the vulnerability exploited during the incident,
- verifying the security of associated IT systems,
- searching for back doors left by the attacker,
- outlining and supporting the next steps to reduce the risk of further incidents.
Report an incident