{"id":11758,"date":"2021-05-06T09:18:53","date_gmt":"2021-05-06T07:18:53","guid":{"rendered":"https:\/\/usd.formwandler.rocks\/security-analysis-pentests\/incident-response-forensik\/"},"modified":"2022-08-26T11:55:50","modified_gmt":"2022-08-26T09:55:50","slug":"incident-response-forensics","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/security-analysis-pentests\/incident-response-forensics\/","title":{"rendered":"Incident response forensics"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||38px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_font_size=\"30px\" text_line_height=\"1.2em\" header_font=\"Roboto||||||||\" header_text_color=\"#F07F1D\" header_font_size=\"50px\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-analysis-header-jede-sekunde-zaehlt.jpg\" custom_margin=\"-31px||0px||false|false\" custom_padding=\"166px|60px|62px|60px|false|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h1 style=\"text-align: center\">Every Second Matters<\/h1>\n<p style=\"text-align: center\">Hacker attacks occur daily. <br \/>Proper handling is still rare.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"0px|0px|0px|0px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>The question is not if hackers will succeed, but when.<\/h2>\n<p><span>IT security has never been a more critical issue than now. The trend towards professionally organized cyber crime continues. Attackers are getting stronger and developing more and more targeted and complex attack methods. One example is<\/span><strong><span>\u00a0<\/span>Advanced Persistent Threat\u00a0(APT)<\/strong><span>, which consists of several attack levels. Spear Phishing attacks are often used to defeat security systems: Once the attackers have hacked into the system, they remain undetected for months, spying on sensitive information or sabotaging critical infrastructure. A prompt reaction and thorough investigation is essential. Every company should therefore have a well-structured approach in place to properly deal with attacks.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"30px||30px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Are you prepared for the worst case scenario?<\/h3>\n<p><span>Learn about the most important issues you need to be aware of.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"\/en\/security-analysis-pentests\/hacker-attack-what-to-do\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-digitale-forensik-readiness-kachel.jpeg\" title_text=\"usd-herolab-digitale-forensik-readiness-kachel\" url=\"\/security-analysis-pentests\/hackerangriff-was-tun\/\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"30px||30px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-first-investigation-kachel.jpeg\" title_text=\"usd-herolab-first-investigation-kachel\" url=\"\/security-analysis-pentests\/wurde-ich-gehackt\/\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Do you have a suspicion?<\/h3>\n<p><span>Do you have a feeling that your company has been compromised?\u00a0<\/span><span>We are there for you.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"\/en\/security-analysis-pentests\/have-i-been-hacked\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"30px||30px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Have you been hit by a cyber-attack?<\/h3>\n<p><span>Our team of experienced IT forensic experts is ready to help you!<\/span><a href=\"\/en\/contact-form-analysis-pentests\/\"><span>\u00a0<\/span>Contact us<\/a><span>.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"\/en\/security-analysis-pentests\/digital-forensics\/\" button_text=\"Learn more\" _builder_version=\"4.16\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-forensik-1.jpeg\" title_text=\"usd-herolab-forensik\" url=\"\/security-analysis-pentests\/digitale-forensik\/\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every Second Matters Hacker attacks occur daily. Proper handling is still rare.The question is not if hackers will succeed, but when. IT security has never been a more critical issue than now. The trend towards professionally organized cyber crime continues. Attackers are getting stronger and developing more and more targeted and complex attack methods. One [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":15265,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-11758","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11758","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=11758"}],"version-history":[{"count":0,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11758\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/15265"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=11758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}