Suspect a cyberattack?

If you suspect your organization has been targeted by a cyberattack, itโ€™s crucial to act quickly.

If you suspect your organization has been targeted by a cyberattack, itโ€™s crucial to act quickly.

Do not touch anything and contact us immediately:

+45 7777 0911

For technical issues, call: +45 7777 0877

What to do now?

  • Stay calm. Don’t panic
    The most important thing is to keep a clear head. Rash actions can make things worse. Do not touch anything. Avoid turning off or restarting systems. Do not delete any files, as this could destroy valuable logs.
  • Disconnect the system from the internet
    To stop any potential data transfer to attackers, disconnect the affected system from the internet.ย 
  • Contact an expert
    Time is of the essence. Professionals can help identify the type of attack – whether itโ€™s ransomware, phishing or something else – and guide you through the next steps.
  • Collect and secure evidence
    Log files, access logs and other data can help assess the attack. Ensure all relevant information is stored securely and remains unaltered.
  • Inform relevant stakeholders
    Depending on the severity of the attack, you may need to notify authorities, customers or partners. For example, NIS2 requires a notification within 24 hours of becoming aware of a significant incident, early warning, and an initial assessment within 72 hours.

Key considerations

  • What type of attack is it?
    Cyberattacks come in many forms, from ransomware to data exfiltration. Without professional assistance, identifying the exact type can be challenging.
  • Have the attackers been here for a while?
    Many attacks begin with a silent breach, where attackers explore your system before launching their attack. Statistics reveal that the average time to detect a breach is 212 days.
  • Avoid destroying evidence
    While it might be tempting to clean up immediately, deleting logs or other data can make it difficult to identify the cause of the attack.

Prevention is the best defense

While no one can guarantee complete immunity to cyberattacks, you can significantly reduce the risk with a proactive approach:

  • Implement a robust logging strategy to detect unusual activity early.
  • Educate employees on cybersecurity to lower the risk of phishing attacks.
  • Keep systems and software updated to minimize known vulnerabilities.

We are here to help

Need assistance handling an active attack or preparing your organization for the future? Contact our experts today.