Incident Response
Every hour of downtime costs an average of €70,000 in losses. Our team responds in 15 minutes - containment, forensics, eradication, recovery. You minimize financial losses, preserve evidence, and return to operations faster.

During an attack, every minute costs thousands in losses
Team ready for action - available 24/7
Containment
Threat isolation in minutes not hours
Forensics
Forensic analysis with evidence preservation
Recovery
Safe return to operations
Ransomware on Saturday - Company Lost 3 Weeks of Production
An automotive parts manufacturer was hit by ransomware on Saturday at 11:15 PM. IT noticed on Monday at 8:00 AM - 33 hours after the attack started. 90% of production systems and backups were encrypted. There was no IR procedure or contact for specialists. Downtime: 3 weeks. Cost: €2.8 million + lost contracts.
Without Incident Response procedures:
- Chaos and panic - no one knows what to do first
- Evidence loss due to unskilled actions
- Extended downtime (average 21 days for ransomware)
- No report for insurer = claim denial
- Non-compliance with NIS2 requirements (mandatory incident reporting within 24h)
Professional Response from Minute One
We don’t experiment on your production systems. Our team has experience in hundreds of incidents - from ransomware through APT to insider threats. We operate according to proven playbooks, preserve evidence, and document every step.
What you get:
- Immediate 24/7/365 response (phone, email, dedicated channel)
- Triage and situation assessment within the first hour
- Containment - threat isolation without destroying evidence
- Forensic analysis (digital forensics) maintaining chain of custody
- Attack vector identification, timeline, and compromise scope
- Safe threat eradication (malware, backdoors, accounts)
- Recovery support - system restoration and verification
- Final report for management, authorities (CSIRT, law enforcement), and insurer
- Preventive recommendations (lessons learned)
Who Is It For?
This service is for you if:
- You have an active incident NOW (ransomware, intrusions, data breach)
- You’re subject to NIS2 and need incident reporting procedures
- You want an IR retainer - guaranteed response time
- You have cyber insurance and want to meet its requirements
- You need forensic analysis after an incident (for court, regulator)
When Do You Need Incident Response?
Attacks and Intrusions
- Ransomware - encrypted files, ransom demand
- System intrusions - unauthorized access, backdoors
- Malware and viruses - infections, botnet, cryptominers
- Successful phishing - compromised accounts, fraud
- DDoS attack - service unavailability
Data Breaches
- Personal data leak - mandatory GDPR notification within 72h
- Intellectual property theft - know-how loss
- Account compromise - hijacked admin accounts, VIP email
- Data exfiltration - suspected leak to competitors
Suspicious Activities
- Unusual network traffic - C2 communication, suspicious connections
- Log anomalies - unknown logins, unusual hours
- Security system alerts - EDR, SIEM, IDS/IPS
- Employee report - suspicious emails, files, behavior
Engagement Models
Ad-Hoc Incident Response
One-time assistance with an active incident:
- Payment for actual hours worked
- Rate: €120-190/h (depending on time and criticality)
- Response start: up to 4 business hours
- For companies without IR retainer
When: You have an incident NOW and can’t wait
Incident Response Retainer
Subscription ensuring team readiness:
- Guaranteed response time (15-60 minutes)
- Preferential hourly rates
- Hour package included in subscription
- Regular exercises and procedure tests (tabletop exercises)
- Playbook preparation for typical scenarios
- 24/7 hotline available
Price: from €1,900/month | For: Companies with NIS2 requirements, critical sectors
IR Procedure Development
Building incident response readiness:
- Procedure and playbook development
- Role and responsibility definition (RACI)
- Tool configuration (SIEM, EDR, communication)
- IT team training
- Tabletop exercises and incident simulations
- Cyber insurer integration
Time: 4-8 weeks | Price from: €14,000
How we work
Our proven service delivery process.
Triage
Situation assessment and action prioritization (0-1h)
Containment
Threat isolation and evidence preservation (1-4h)
Investigation
Forensic analysis and attack timeline (4-72h)
Eradication
Threat removal and vulnerability closure (72h+)
Recovery
System restoration and final report
Benefits for your business
What you gain by choosing this service.
Loss Minimization
Every saved hour means hundreds of thousands saved
Evidence Preservation
Professional forensic analysis for court
Insurer Support
Report for cyber damage claims
NIS2 Compliance
Meet IR procedure and reporting requirements
Related Articles
Expand your knowledge with our resources.
IT and OT collaboration in cybersecurity – why the biggest threat is not the attackers but the lack of integration
In industrial cybersecurity, the biggest problem is not sophisticated attackers. It is the lack of collaboration between IT and OT teams that opens the door to cybercriminals. Discover strategies that unite both worlds into one effective line of defense.
Read more →Why SOC is Practically Essential for KSC/NIS2 Compliance
KSC/NIS2 regulations don't explicitly require having a SOC. However, the 24-hour serious incident reporting obligation makes it practically impossible to meet requirements without mature monitoring mechanisms.
Read more →Email Security - How to Protect Your Company from Ransomware and Phishing
90% of ransomware attacks start with an email. Learn practical methods to protect business email: SPF, DKIM, DMARC, attachment sandboxing, SEG.
Read more →Frequently Asked Questions
Common questions about Incident Response.
How much does help with a ransomware incident cost?
Cost depends on complexity. Typical ransomware incident requires 40-120 hours of work (forensics, eradication, recovery). Cost: €5,000 - €25,000. For comparison: average ransom is €120,000, and downtime can cost millions.
How quickly do you respond to an incident?
For IR retainer clients: 15-60 minutes (depending on SLA). Without retainer: up to 4 business hours. In critical situations (active ransomware) - immediately. We operate 24/7/365.
Will you help recover encrypted files?
We help with safe recovery from backups and securing against repeat attacks. File decryption without the key is often impossible. As a last resort, we support negotiations with attackers.
Will you report the incident to authorities for us?
We'll prepare the report with technical information and attack timeline. Formally, the Data Controller (your company) submits it. For NIS2, we'll help report to CSIRT within the required 24h timeframe.
What's the difference between IR retainer and ad-hoc help?
IR retainer is a subscription guaranteeing 15-60 min response time, preferential rates, and hour package. Ad-hoc is one-time help with up to 4h business start time and €120-190/h rate. We recommend retainer for companies with NIS2 requirements.
Contact your account manager
Discuss Incident Response with your dedicated account manager.
