
Rapid Response

INCIDENT RESPONSE
Efficient incident handling procedures and investigative techniques are necessary to determine if a breach has occurred and to stop an ongoing attack as quickly as possible. Incidents can be caused by technical failures, malware & ransomware, external attackers and malicious insiders. Bad Rabbit Security can assist to identify the root cause of an incident or attack, using advanced digital forensic techniques, and to gather critical evidence under proper chain-of-custody that can be used in legal proceedings or for liaison with local and international law enforcement, and assist with rapid recovery of data and systems.
​
Bad Rabbit Security can create, maintain and test incident response policies, procedures and playbooks for your organization to develop your own incident handling capabilities and train your staff in how to react during an incident.
​
Bad Rabbit Security provides incident response staff training and both live-exercise and tabletop test exercises (TTX) of your incident and crisis management plans and procedures. Our certified professionals can conduct exercises either remotely or on-site, anywhere in the world.​​​​​​​​​
​
Bad Rabbit Security’s certified forensic technicians are trained in the preservation of digital evidence and proper chain of custody to allow clients to present legally admissible evidence in court or to law enforcement. Bad Rabbit Security can assist HR, General Counsel and Legal & Compliance teams in handling internal affairs such as violations of corporate policy, insider theft and copyright infringement.
We can provide secure, encrypted and logged communications during an incident and establish an incident register and breach reporting process to notify Clients, Regulators, Data Protection Commissioners and District Attorneys where applicable if a notifiable breach has occurred.
In addition, Bad Rabbit Security can assist you in recovering lost or deleted files and data from damaged hard disks, USB drives etc. and when malware attacks and other situations cause data loss or corruption of valuable or sensitive data.
​
​
​