Hit by a cyber-incident? CERT is available 24/7

The Tesorion Computer Emergency Response Team (T-CERT) helps your business to keep going securely after a security incident so that you can continue operating with confidence.

Tesorion CERT can help in the event of a cyber incident

Certified CERT

The Tesorion Computer Emergency Response Team offers specialist support 24/7. In emergencies, we immediately conduct an initial assessment by telephone and do all we can to get the situation under control as soon as possible. Of course, we can also send out an expert to assess the situation first-hand.

Multidisciplinary approach

After the initial triage, we mobilise any resources that might be needed. This might, for example, involve a digital forensic investigation into the cause and scope of the incident. Our Incident Handlers then provide appropriate advice to help you regain control of the situation as soon as is humanly possible.

Front line to boardroom

The T-CERT can support and communicate at every layer within the affected organisation, from the level of system administrators to legal experts and from director to boardroom.

Why choose Tesorion?


Available 24/7

Cybercriminals never sleep and that is why the T-CERT is available whenever there is an emergency and whenever you need us.



You can count on an immediate response from our experts and once they have carried out an initial assessment, we will know what steps we need to take.


We update you continuously on what we are doing and what steps need to be taken. We understand the importance of clear communication in crisis situations.

Clear reporting

Our pragmatic approach will eventually result in a clear and easy-to-understand report detailing our findings, observed risks and recommendations.

In what kind of situations might you need help from Tesorion CERT?

Of course, not every situation is an emergency. Sometimes you will have a gut feeling that something is wrong or that your security has already been breached. T-CERT can, for example, help you carry out a forensic investigation into traces of historical or active hacking activity on servers and workstations.

T-CERT does so by using specialist software to expose indicators of malicious activity. The software in question scans various forensically relevant system sources for, among other things, (traces of) malware, system manipulations, potentially malicious system processes, and other abnormal files.

This approach can be worthwhile in the context of, for instance, businesses mergers or takeovers. A scan can, for example, be carried out prior to the actual merger to give you an early insight into a particular state of affairs and to ensure that you do not, inadvertently, carry infections over from the old network to the new one.

Finally, T-CERT can also help you with:

  • Reverse-engineering of malware;
  • Network monitoring;
  • Threat Intelligence;
  • Crisis management;
  • Media and PR support.

Our customers


Check out the latest relevant news, podcasts and blogs from our experts on this topic here.

BlogCERTSOCTesorion Immunity
28 January 2021

Choice aid for cyber-security measures – part 1

To many people, making choices is a stressful moment. Ranging from what am I going to eat, what am I going to wear today, and how do I keep my…
23 January 2021

Analysis of the Judge ransomware

Ransomware remains a major cyber threat for both businesses and consumers to this day. Even though many big names already exist in ransomware land, new families still frequently appear in…
BlogCERTDigital Risk Protection
17 December 2020

Who has my login details?

Do you know who is in possession of YOUR personal data? Theft of confidential data by hackers is an everyday occurrence. But what can they do with the data and…
View all publications

Unfortunately, cyber-threats are no longer something new. However, a truly coherent cyber-approach is.