United States

Incident Response Guide

Security incidents happen; how you respond is critical

INSIGHT ARTICLE  | 

Download Guide

In today’s environment, it is likely that most companies will eventually experience an information security incident. Timing is critical when diagnosing the nature and origin of the incident, and outlining the appropriate reaction. The speed and accuracy of incident response are important factors in addressing issues and protecting your networks and systems.

To help your organization identify and respond to information security incidents, RSM has developed a comprehensive incident response guide. The guide includes data incident checklists as well as key steps to take to respond to a potential breach. It also details examples, assessment questions and containment processes, and explains where to look for evidence for a number of common incidents, including:

  • Malware and ransomware attacks
  • Business email compromises
  • Social engineering attacks
  • Lost or stolen computers, devices or media

The guide also includes an incident response methodology, as well as common security assessment areas, detailing processes that organizations may fail to address when developing a data security platform. In addition, the document provides potential evidence sources and how they can help you to identify and investigate a suspected incident.

With an increasing number of threats, your organization must be prepared to respond quickly and thoroughly to minimize damage to critical systems and sensitive data.

View the guide here

AUTHORS


How can we help you?

Contact us by phone 800.274.3978 or
submit your questions, comments, or proposal requests.


Receive Risk Bulletin by Email

SUBSCRIBE


Cybersecurity Rapid Assessment®

Complete our Cybersecurity Rapid Assessment form to be contacted about receiving our "quick-hit" evaluation of your organization’s overall security risk.

LEARN MORE




Events/Webcasts

IN-PERSON EVENT

Meet RSM at the 2020 IIA GAM Conference

  • March 16, 2020

LIVE WEBCAST

Preparing for the Cybersecurity Maturity Model Certification

  • March 05, 2020