In the field of computer attack response, Synetis experts in incident response first identify the “patient zero” system and possibly the attack vector. After this initial Containment, we then move on to Eradication and Remediation. Finally, the response to an incident, in IT, ends with Restoration and then Capitalization.
To conclude, therefore, in the case of a proven compromise or a cyber attack (already over or still in progress), our CERT team proposes an incident response as quickly as possible in order to remedy the problem and then prepares a bespoke action plan corresponding to your needs.