UK’s trusted IT infrastructure partner since 2003
sales@servnetuk.com
0800 987 4111
Servnet
ConfiguratorGet in Touch
Cyber Security · Incident Response

When a breach happens,
every second counts.

The average data breach costs £3.58 million. GDPR requires ICO notification within 72 hours. Ransomware operators work through the night. Your incident response capability must be as prepared as the attackers.

Servnet delivers structured, NIST SP 800-61 aligned incident response — from initial containment through forensic investigation, regulatory notification, and full recovery. Available as a retainer or on-demand engagement.

Incident TimelineACTIVE INCIDENT
T+0:00Ransomware encryption detected by EDR✅ Contained
T+0:47Affected endpoints isolated (network quarantine)✅ Complete
T+1:20Initial forensic triage complete — scope confirmed✅ Complete
T+2:15Credential rotation — all privileged accounts✅ Complete
T+4:00GDPR breach assessment — notification required⚠️ In Progress
T+8:00Eradication complete — clean backups identified🔄 Pending
T+18:00Phased recovery begins from Rubrik snapshots🔄 Pending
£3.58M
Average cost of a data breach (IBM 2024)
72 hrs
GDPR ICO notification window from discovery
197 days
Average attacker dwell time before detection
69 days
Average time to contain a breach
21%
Of incidents involve ransomware (Verizon DBIR)
NIST
SP 800-61 aligned incident response process
NIST SP 800-61 IR Lifecycle

Six Phases of Incident Response

A structured, documented process aligned to NIST SP 800-61 and NCSC guidance — ensuring a consistent, thorough response regardless of incident type or severity.

📋
Phase 01

Preparation

The most important phase happens before any incident occurs. A documented incident response plan, tested playbooks, pre-approved containment actions, retainer agreements, and regular tabletop exercises ensure your organisation can respond decisively when — not if — an incident occurs.

Key Actions
  • IR plan documentation and playbook development
  • Tabletop exercises simulating ransomware, BEC, and data breach scenarios
  • Retainer agreements with defined SLAs for rapid response
  • Security tooling configuration for forensic data retention
🔍
Phase 02

Detection & Analysis

Rapid, accurate incident scoping determines the appropriate response scale. Attacker dwell time is reduced by swift identification of the initial access vector, compromised systems, data accessed, and current attacker position in the kill chain.

Key Actions
  • Alert triage and initial incident classification
  • Indicator of compromise (IOC) collection and enrichment
  • Scope determination — which systems, users, and data are affected
  • Severity classification and escalation to appropriate response level
🔒
Phase 03

Containment

Preventing further spread is the immediate priority. Short-term containment isolates affected systems while preserving forensic evidence. Long-term containment may involve network segmentation, credential rotation, and additional monitoring while the root cause is investigated.

Key Actions
  • Endpoint isolation — network quarantine of compromised systems
  • Credential rotation for affected accounts and privileged access
  • Firewall rule implementation to block attacker C2 communications
  • Evidence preservation — forensic imaging before remediation begins
🗑️
Phase 04

Eradication

Every malicious artefact, backdoor, and persistence mechanism must be identified and removed before recovery begins. Premature restoration from infected backups or missed persistence mechanisms leads to re-infection — the most expensive mistake in incident response.

Key Actions
  • Malware removal and persistence mechanism elimination
  • Identification and patching of exploited vulnerabilities
  • Verification that all attacker footholds have been removed
  • Clean backup identification — confirming restore points pre-date compromise
🔄
Phase 05

Recovery

Phased restoration from verified clean backups, with enhanced monitoring throughout the recovery window. Systems are restored in priority order, tested before return to production, and monitored for signs of re-infection. Business continuity is restored as rapidly as possible.

Key Actions
  • Phased system restoration from verified clean backups
  • Enhanced monitoring during the recovery window
  • Testing of restored systems before return to production
  • Business continuity handoff and stakeholder communications
📊
Phase 06

Post-Incident Review

Every incident is a learning opportunity. A structured post-incident review identifies root causes, documents the timeline, assesses the effectiveness of the response, and produces actionable recommendations — preventing recurrence and strengthening defences for future incidents.

Key Actions
  • Root cause analysis and attack timeline reconstruction
  • Response effectiveness review — what worked, what didn't
  • Control improvement recommendations with prioritisation
  • Regulatory reporting — ICO notification, NCSC reporting where required
Incident response lifecycle — NIST SP 800-61 six-phase cycle from preparation through lessons learned
Incident Types

How We Respond to Different Incidents

🦠

Ransomware Infection

  • Immediate isolation of encrypted systems to prevent further spread across the network
  • Ransomware variant identification to determine if free decryptors exist before any ransom consideration
  • Recovery from Rubrik or Veeam immutable backups — no ransom payment required
  • Forensic investigation of initial access vector to prevent re-infection post-recovery
📤

Data Breach & Exfiltration

  • DLP log analysis and cloud storage audit to determine what data was accessed and exfiltrated
  • Attacker dwell time calculation — understanding when the breach began, not just when it was discovered
  • GDPR Article 33 notification assessment — 72-hour ICO reporting obligation determination
  • Affected individual notification planning and regulatory correspondence support
📧

Business Email Compromise

  • Mailbox audit to identify forwarding rules, compromised contacts, and sent messages
  • Financial institution notification if fraudulent payments were initiated
  • Microsoft 365 tenant hardening — MFA enforcement, legacy auth blocking, OAuth review
  • NCSC guidance followed for reporting significant BEC incidents to Action Fraud
🕵️

Insider Threat Incident

  • Privileged session recording review to reconstruct all actions taken by the insider
  • Data access log analysis — identifying what was copied, printed, or emailed externally
  • HR and legal coordination — evidence preservation for disciplinary or criminal proceedings
  • Access revocation and entitlement audit to prevent similar abuse by other accounts
GDPR & Legal Obligations

Your GDPR Obligations When a Breach Occurs

UK GDPR and the Data Protection Act 2018 impose strict obligations on organisations that experience a personal data breach. The 72-hour clock starts from the moment of awareness.

72-Hour Notification

Article 33 requires notification to the ICO within 72 hours of becoming aware of a personal data breach — unless the breach is unlikely to result in risk to individuals.

What to Document

Nature of the breach, categories and approximate number of data subjects affected, likely consequences, and measures taken or proposed to address the breach.

Individual Notification

Article 34 requires direct notification to affected individuals without undue delay when the breach is likely to result in high risk to their rights and freedoms.

DPO Involvement

Where a Data Protection Officer is appointed, they must be informed immediately. We help coordinate DPO engagement and ICO correspondence throughout the incident.

Servnet provides end-to-end support for ICO notification — drafting the breach report, preparing the Article 33 documentation, and coordinating with your DPO and legal team throughout the 72-hour window.
Recovery Tools

Technology That Powers Recovery

CrowdStrike Falcon
CrowdStrike Falcon
Containment & forensic investigation
SentinelOne
SentinelOne
Autonomous response & ransomware rollback
Rubrik Security Cloud
Rubrik Security Cloud
Immutable backup & clean recovery
Veeam Data Platform
Veeam Data Platform
Rapid restore & ransomware-hardened backup

Do you have an incident response plan?

Most organisations discover they don't — in the middle of an incident. An IR retainer gives you pre-agreed response procedures, defined escalation paths, and the assurance that expert help is available the moment you need it.

Discuss an IR RetainerSecurity Assessment →