INCIDENT RESPONSE PLAN
We take a thorough approach that enables us to respond swiftly and effectively to minimize harm, assure the speedy restoration of services, and uphold user trust.
- Identification: Automated systems watch for unusual behaviour and notify our team.This can also include problems that users have reported, or irregularities found by our regular checks.
- Our staff assigns a severity rating to the incident, ranging from low to critical. The classification is based on variables like how much data is involved, which systems are impacted, and whether there could be a commercial impact.
- The incident is escalated internally based on seriousness. The appropriate teams are informed.
- Once the problem has been located, it is eliminated. If malware is discovered, it is deleted, and if an unauthorized access point exists, the breach point is sealed.
- The afflicted systems are returned to their pre-attack status after making sure the threat has been entirely eliminated. In most cases, the website can be cleaned of threats, or a clean backup can be restored. In the event of data loss, the most recent secure backup is used to restore the lost data. To make sure everything is operating as planned, thorough testing is done.
- A post-incedent analysis is carried out to determine the underlying cause after the recovery. Our security policies, practices, and systems may need to be updated as a result of this to stop instances like this from happening again.
- Affected parties will receive constant communication throughout the situation. Including the seriousness of the issue, our plan of action, whether user data may have been harmed, and our estimated time of resolution.