Tom Cooley, President, Versatalis Payment Solutions
We've been extremely happy with the high level of support, simplicity and follow through from SecurityMetrics.
Find out how to recover from a data breach
To minimize breach impact and maintain your reputation, SecurityMetrics PCI Forensic Investigators (PFI) work with merchants, healthcare providers, and legal entities in confidence to help organizations quickly recover from compromise.
Here are the typical actions a forensic investigator would take:
Preliminary research: Forensic investigations begin with some research on the company. The PFI needs to “scope” out the merchant’s environment, finding out where critical data resides, the systems that connect to it, and how the data flows in and out of the network.
Onsite data gathering: The forensics team then goes onsite and gathers data from identified devices.
Analysis: The investigation team brings the data back to their headquarters and analyzes it thoroughly to confirm whether a data breach actually occurred, determine what data the attacker was able to steal, and discover which vulnerabilities were exploited in the breach.
Reports: About a week after the initial data acquisition, the investigator will issue a short preliminary report that shows whether or not they’ve discovered any indicators of compromise or other overt evidence of a data compromise. After the forensic data has been fully analyzed, the investigator will submit a complete final report that includes how the attack happened, which vulnerabilities were exploited, and what data was at risk.
Forensic investigations can be costly. However, remember that the investigation involves one or more PFI’s examining a mountain of data.
The cost will depend on the size of your organization; the larger your organization, the more data you likely have that will need to be examined.
An incident response plan is a documented, written plan with 6 distinct phases that helps IT professionals and staff recognize and deal with a cybersecurity incident like a data breach or cyber attack. Properly creating and managing an incident response plan involves regular updates and training.
A well-executed incident response plan can minimize breach impact, reduce fines, decrease negative press, and help you get back to normal operations more quickly.
Here's a helpful blog that goes over the six phases of incident response.
Check out this helpful handout here that goes over what should be included in your incident response plan.
Check out this blog on the six phases of responding to a breach.
SecurityMetrics' Forensic Investigators have years of experience and expert tools that provide a fast recovery solution. Our investigators work with you in confidence to identify all exposure points and provide necessary education to achieve a full recovery.
After discovering the cause of breach, SecurityMetrics' Forensic Investigators immediately advise how to patch breach points. Time is taken to ensure you understand your responsibility so you can continue to run your business without continuing to leak data.
The only way to reduce the likelihood of future compromise is to implement data security best practices, including complying with PCI Data Security Standard (DSS) compliance, HIPAA compliance, and other compliance mandates. SecurityMetrics' Forensic Investigators provide best practice recommendations for HIPAA compliance, PCI validation, and other security mandates to help you maintain a secure environment.
SecurityMetrics provides an initial consultation on immediate steps you should take to stop the loss of payment card data, protected health information, or other sensitive data and minimize the damage to your business and customers.
Compromise hurts. SecurityMetrics makes it a priority to inform, educate and answer questions to ensure you know how to quickly recover from a breach. From start to finish, SecurityMetrics provides a higher standard of customer service to ensure you can quickly return to business as usual.
As technology changes and the criminal toolkit expands, SecurityMetrics' PFI continually adjust and create new tools to analyze cyber landscapes and help you recover from compromise.
SecurityMetrics analyzes and interprets the available forensics data to discover how, where, and when the breach occurred, as well as the vulnerabilities that allowed the breach to happen. The analysis determines what sensitive data was compromised or is at risk. Where applicable, it also reveals aspects of the environment out of compliance with PCI or HIPAA requirements.
SecurityMetrics first files a preliminary report on the compromise. Once the investigation is finalized, a final report is submitted to appropriate parties. SecurityMetrics then assists you in a summary-of-events conference call with the appropriate parties. The call details the compromise and demonstrates how the situation was resolved.
SecurityMetrics pricing is simple–your scope is evaluated based on your needs, giving you a custom quote and avoiding unnecessary add-on charges.
We've been extremely happy with the high level of support, simplicity and follow through from SecurityMetrics.
We have been customers of SecurityMetrics for about eight years. We are so impressed with the patient and professional way that their staff treats customers. They do not hurry, seem tired, act annoyed or too busy to work with their customers. Every person I spoke to was great!
SecurityMetrics is the most retail friendly solution. At the small business level, frequently the person that has to interface with the tool is an owner or someone who has financial responsibility, but they may not necessary be technically savvy with using online tools. We believe SecurityMetrics meets that need better than anyone else we've seen.
I wanted to let you know that every experience I've had has been very positive, professional, and friendly.
SecurityMetrics' Forensic Investigators have years of experience and expert tools that provide a fast recovery solution. Our investigators work with you in confidence to identify all exposure points and provide necessary education to achieve a full recovery. Request a quote by filling out the form.
Forensic Investigations Data Sheet
How to Effectively Manage a Data Breach White Paper
Window of Compromise White Paper
SecurityMetrics Guide to PCI Compliance