State of Incident Response: APAC
by Paul Jackson
![APAC State of Incident Response](https://media-cdn.kroll.com/jssmedia/kroll-images/insights/apac-ir/apac-ir-thumbnail.png?mw=1080)
Be careful with the information you share online or on social media, and don’t click on unsolicited requests to update or verify account information.
Look up the company’s phone number—don’t use one provided by a potential scammer— and call to determine if a request is legitimate.
Carefully examine the email address, URL and spelling, never open email attachments from an unknown sender and treat urgent requests with suspicion.
Set up multifactor authentication where allowed, making it harder for attackers to gain access to an account, even if credentials are stolen.
Incident response, digital forensics, breach notification, managed detection services, penetration testing, cyber assessments and advisory.
Kroll’s elite security leaders deliver rapid responses for over 3,000 incidents per year and have the resources and expertise to support the entire incident lifecycle.
Manage cyber risk and information security governance issues with Kroll’s defensible cyber security strategy framework.
Kroll’s Virtual CISO (vCISO) services help executives, security and technology teams safeguard information assets while supporting business operations with augmented cyber expertise to reduce business risk, signal commitment to data security and enhance overall security posture.
You learn today that your organization is facing some kind of cyber incident. Could be ransomware, highjacked O365 email account, PII or PHI exfiltrated, misconfigured network settings exposing data, etc. What do you do first?
Kroll's data privacy team provide DPO consultancy services to help you become and stay compliant with regulatory mandates.
Kroll’s field-proven incident response tabletop exercise scenarios are customized to test all aspects of your response plan and mature your program.
Kroll delivers more than a typical incident response retainer—secure a true cyber risk retainer with elite digital forensics and incident response capabilities and maximum flexibility for proactive and notification services.