Under Attack?

Get Help Now For Malware, Phishing, or Other Active Threats Against Your Organization!

zvelo’s Cybersecurity experts deliver a range of threat help options to identify, contain and remediate active threats to your organization’s network.  Whether you’re observing suspicious activity in the network, or you’ve discovered that your network has been breached, our team can help you quickly assess the situation to recommend next steps and follow up actions to secure the network and protect end points and users from active or potential threats.

zvelo Cyber Threat Intelligence

What to Do When You Discover, or Suspect A Breach

6 Critical Action Items to Complete As Soon As Possible

If you know, or even suspect, that your organization is under attack, zvelo’s Professional Services Team can assist you with any steps of your Incident Response.  Whether you need short term, supplemental resources to assist with the investigation, or if you don’t have the first clue what to do, or where to begin, our team is ready to support you. 

Below are 6 very simple steps that will help guide you in what to do when you discover a breach.  

Incident-response-icons-01

Step 1:  Do NOT Power Down Your Systems

While this may seem counter intuitive, shutting down your network or powering down connected machines can result in a loss of valuable evidence.

Incident-response-icons_System Compromised Survey Damage

Step 2:  Survey the Damage

As much as possible, determine the extent of the damage in terms of who, and what systems, may be compromised.  

Incident-response-icons_Isolate Compromised Areas of Network

Step 3:  Isolate Impacted Areas

As much as possible, isolate the compromised areas of the network to limit any further spread and potential damage.

Incident-response-icons_Gather Evidence, Malware Samples, URLs

Step 4:  Gather Evidence

Any evidence you can gather will be significant to the forensic investigation and may include a malware sample, a malicious document, URL, etc. 

Contact Law Enforcement After a Breach

Step 5:  Engage Law Enforcement

Data breaches should be reported to the following law enforcement agencies:  FBI, US Secret Service, US Immigration & Customs Enforcement, the District Attorney, State & Local Law Enforcement.

Incident-response-icons_Notify Impacted Parties of Breach

Step 6:  Identify & Notify Affected Parties

Any time a breach puts an individual’s information at risk, you must notify them via letter, email, phone call, or in person — unless otherwise directed by law enforcement.

What to Expect

Getting Started with zvelo’s Threat Help

When you submit the threat help assessment form, your submission notifies our cybersecurity team directly.  Based on the information provided, they will review the information according to the business hours and response time priorities posted below, and quickly confirm whether or not you are dealing with an active threat.

Threat Assessment Danger

If We Confirm an Active Threat:

  • You will be notified within the appropriate time frame according to severity level and response times posted.
  • The team will perform a quick assessment to recommend immediate, short-term follow up actions as well as to provide service options to assist with further investigation and analysis of your incident, containment and/or remediation.
Threat Assessment No Danger

If We Confirm a Threat is No Longer Active, or Not a Threat:

  • You will be notified within the appropriate time frame according to response times posted.
  • The team will provide some recommended service options which will help you build a stronger defensive layer to protect your network and your organization’s assets

Business Hours and Response Times for Reported Incidents.

Please note the core business hours and response times posted below as these will determine how reported incidents are handled by the cybersecurity team.

zvelo cybersecurity professional services team

Core Business Hours:

Days:  Monday – Friday
Hours:  8:00 am – 4:00 pm MDT

zvelo Threat Assessment Response Times

Approximate Response Times*

High Severity:  Up to 30 Minutes
Medium Severity:  Up to 1 Hour
Low Severity:   Up to 3 Hours

Response times are approximate and apply to requests received during core business hours. Requests for threat help which are received outside of core business hours will be prioritized for the next business day.  Existing clients may or may not be restricted to responses within core business hours, depending on the current agreement in place.

Get Threat Help

Please complete the threat help assessment form below and include as much detail about the incident as possible.  The information you provide will be used by our cybersecurity team to prioritize your incident and determine the most appropriate course of action. If you suspect a URL to be malicious or phishing, please include the link to the URL in the description text area of the form.