Incident readiness and response work hand-in-hand

Juhani Hintikka of F-Secure

While it’s important to engage incident response during a cyber security incident, F-Secure Consulting‘s global incident response offerings put equal emphasis on readiness as a strategy for mitigating the risk of cyber attacks.

In the last 12 months, F-Secure Consulting responded to dozens of major security incidents for organisations across the globe. Ransomware attacks accounted for about a third of all engagements. Other cases included acts of nation-state level espionage, different financially-motivated attacks, and more. Many involved ‘hands-on-keyboard’ attacks.

F-Secure Consulting’s Incident Response team’s average response time to clients was 15.4 minutes. And on average, engagements lasted for approximately 12 days. However, some incident response cases can last several weeks or even months, increasing an attack’s impact and mitigation costs.

“It’s easy to see why a comprehensive incident response plan seems like a luxury when weighed against other preventative measures that offer immediate benefits. However, careful preparation will improve the speed and effectiveness of organisational response, ultimately lowering the impact of an incident.

From a c-level point of view, incident response needs to be seen as building organisational resilience by ensuring business continuity in the event of an incident, which is bound to occur sooner or later. Making contingency plans to limit that inevitable intrusion’s impact on operations, personnel, and clients is clearly the responsible thing for organisations to do given today’s threats,” says F-Secure president and chief executive officer Juhani Hintikka.

Furthermore, the benefits of preparation are beginning to make a difference to more than just restoring operations.

A recent report from Forrester highlighted the increasing interest in an organisation’s security posture from different stakeholders, “Inadequate breach response can lead to financial, operational, and reputational losses. Therefore, following any data breach, the public, government agencies, partners, suppliers, and your cyberinsurance provider will subject your organisation to scrutiny. They want to know what your security posture was before the breach and how well you responded after the breach.”

Such scrutiny from stakeholders including authorities signals increasing expectations for companies to prevent the consequences of an attack from spiraling out of control.

F-Secure Consulting’s incident response services consist of two separate yet complementary offerings to accommodate different needs:

  • Incident readiness: services and retainers designed to reduce the impact of an incident by enabling quicker response times and shorter recovery times while improving response effectiveness and overall return on capability investments.
  • Incident response: support for incidents ranging from post-incident forensic analysis of isolated hosts to incident management, containment, and eradication during a domain compromise.

And as a global, multidisciplinary incident response function that operates as part of a larger organisation offering businesses a comprehensive portfolio of cyber security solutions, F-Secure director of detection and response Matt Lawrence says that F-Secure’s depth of capabilities ensures organisations have access to world-class expertise to fit a wide range of problems.

“We have consultants operating from ten countries across four continents, meaning world-class expertise that can answer a range of questions is often just a message or email away for us and our clients,” explained Lawrence. “Industry-leading malware researchers, threat intelligence analysts, and other non-IR specialists are at our disposal 24/7, and that speedy access can prove critical to preventing an incident from become a crisis.” 

F-Secure Consulting’s Incident Response team is available for immediate remote deployment anywhere in the world. Details and contact information is available here.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

FEATURED IoT STORIES

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, iot home automation is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more
RECENT ARTICLES

How can IoT optimise the bearing supply chain?

Posted on: September 24, 2021

In 2020, stock management issues were estimated to cost UK manufacturers 66 billion GBP  because of disruption caused by the pandemic. Consequently, the quest to improve efficiency, cut waste and enhance supply chain operations is one that suppliers know all too well. Here Chris Johnson, managing director at miniature bearings specialist SMB Bearings, explains how the Internet of Things

Read more

Guardara uncovers key zero day vulnerability in IoT message broker software

Posted on: September 24, 2021

Developer-focused code security specialist Guardara announces it has uncovered a Zero Day Vulnerability in open source software from EMQ, the provider of open source software for IoT devices. The vulnerability, which was uncovered by a non-security expert using Guardara’s powerful testing tool, could have significant implications for connected IoT devices depending on NanoMQ.

Read more