Skip to content

Trending tags

Got hacked? It’s too late to run now!

Emma Paajanen

04.11.16 1 min. read

When a cyber security incident occurs, you need to understand exactly how the attack happened, so you can plan the best way to respond. Earlier this week, we hosted a webinar where our cyber security expert, Janne Kauhanen, talked about incident response.

What do you do when you encounter a security incident? Our cyber security consultants are experienced in helping companies of all sizes with incident response. This process typically consists of five phases:

  1. Initial analysis & briefing
  2. Identification
  3. Containment
  4. Recovery
  5. Aftermath

In this webinar, Janne will walk you through each step and share practical advice and insights based on our experience from the field. In addition, Janne talks about forensic investigation and crisis management exercises, and gives you some tips on how to resource your cyber security operations to effectively handle incident response.

If you have questions on any topics presented in the webinar, please feel free to get in touch with us.

Enjoy the webinar!

Download the “Got hacked webinar slides or learn more at our SlideShare page.

 

Missed the previous episodes? Revisit them now!

Webinar #1: 10 reasons why organizations keep on failing in security management

Webinar #2: Prevention is the cornerstone of cyber security

Webinar #3: How to detect a cyber security breach? – The dos and don’ts

Emma Paajanen

04.11.16 1 min. read

Categories

Comments

2 comments on Got hacked? It’s too late to run now!
  1. I want to understand how do hackers choose a website to hack or infiltrate the business.

  2. jannekauhanen says:

    The “how”s are as varied as the attackers themselves. I would say opportunistic attackers typically have a specific vulnerability in mind, and they’re just scanning the width of the internet to find services with this particular vulnerability. So you’ll get targeted just because you’re vulnerable. More targeted attacks on the other hand occur either because the attacker has a bone to pick with your organization and/or the agenda represented by your website, or because they have something to gain: you’re just a juicy target that will get them into the headlines or you may have information or access that they want. Maybe you’re just a business that’s making money, and they want to scam some of that money.

Comments are closed.

Leave a comment

Oops! There was an error posting your comment. Please try again.

Thanks for participating! Your comment will appear once it's approved.

Posting comment...

Your email address will not be published. Required fields are marked *

Highlighted article

Related posts

Newsletter modal

Thank you for your interest towards F-Secure newsletter. You will shortly get an email to confirm the subscription.

Gated Content modal

Congratulations – You can now access the content by clicking the button below.