Hit by a cyber-incident? CERT is available 24/7
The Tesorion Computer Emergency Response Team (T-CERT) helps your business to keep going securely after a security incident so that you can continue operating with confidence.
The Tesorion Computer Emergency Response Team (T-CERT) helps your business to keep going securely after a security incident so that you can continue operating with confidence.
The Tesorion Computer Emergency Response Team offers specialist support 24/7. In emergencies, we immediately conduct an initial assessment by telephone and do all we can to get the situation under control as soon as possible. Of course, we can also send out an expert to assess the situation first-hand.
After the initial triage, we mobilise any resources that might be needed. This might, for example, involve a digital forensic investigation into the cause and scope of the incident. Our Incident Handlers then provide appropriate advice to help you regain control of the situation as soon as is humanly possible.
The T-CERT can support and communicate at every layer within the affected organisation, from the level of system administrators to legal experts and from director to boardroom.
Cybercriminals never sleep and that is why the T-CERT is available whenever there is an emergency and whenever you need us.
You can count on an immediate response from our experts and once they have carried out an initial assessment, we will know what steps we need to take.
We update you continuously on what we are doing and what steps need to be taken. We understand the importance of clear communication in crisis situations.
Our pragmatic approach will eventually result in a clear and easy-to-understand report detailing our findings, observed risks and recommendations.
Of course, not every situation is an emergency. Sometimes you will have a gut feeling that something is wrong or that your security has already been breached. T-CERT can, for example, help you carry out a forensic investigation into traces of historical or active hacking activity on servers and workstations.
T-CERT does so by using specialist software to expose indicators of malicious activity. The software in question scans various forensically relevant system sources for, among other things, (traces of) malware, system manipulations, potentially malicious system processes, and other abnormal files.
This approach can be worthwhile in the context of, for instance, businesses mergers or takeovers. A scan can, for example, be carried out prior to the actual merger to give you an early insight into a particular state of affairs and to ensure that you do not, inadvertently, carry infections over from the old network to the new one.
Finally, T-CERT can also help you with:
Tesorion uses your personal data to send out requested information and possibly for contact by telephone and for marketing and sales purposes. You can change your preferences whenever you want. Read our privacy policy for more information.
Check out the latest relevant news, podcasts and blogs from our experts on this topic here.
Tesorion uses your personal data to send out requested information and possibly for contact by telephone and for marketing and sales purposes. You can change your preferences whenever you want. Read our privacy policy for more information.