Don't power off
Don't shut down compromised systems: volatile memory (RAM) holds key evidence (encryption keys, active processes). Isolate them from the network if possible (cable unplugged or quarantine).
Call now. Operational response within 30 minutes, initial containment within 4 hours. The first 60 minutes decide the difference between a contained incident and a crisis.
60 seconds to prepare the information useful for the call, then eight actions that preserve evidence and limit damage while the Fortgale IR team is already activating. Even one item executed correctly changes the outcome of the incident.
Don't have it all? Call anyway. We rebuild the picture together.
Don't shut down compromised systems: volatile memory (RAM) holds key evidence (encryption keys, active processes). Isolate them from the network if possible (cable unplugged or quarantine).
Phone in hand: speaking live with an analyst accelerates triage by hours. Every minute lost expands the compromised surface.
Write detection time, observed indicators (ransom note popup, suspicious mail, EDR alert), people who noticed the anomaly. Even a sheet of paper is fine.
Do not announce on compromised corporate channels (Teams, email): the attacker can read. Create an out-of-band channel (phone, CISO's WhatsApp, SMS).
Disable log auto-deletion if possible. EDR, firewall, AD, mail gateway: everything matters. Don't reset passwords without saving them first.
Engage legal department and DPO immediately. If you are NIS2 essential or important, the early warning clock to the national CSIRT (24 hours) has already started.
If you have a cyber policy, activate it immediately: some policies require notification within tight deadlines to cover IR costs.
Who knows what? Limit information to CISO, IT lead, Direction, Legal. No external communications until the picture is clear.
The Fortgale operating model follows the NIST SP 800-61r2 standard, integrated with NIS2 notification requirements and our proprietary Cyber Threat Intelligence on actors targeting European organisations.
Isolation of compromised systems, blocking of suspicious credentials, C2 cut-off, attacker kill chain interrupted. Goal: stop the bleeding.
Reconstruction of the initial vector, mapping of lateral movements, identification of exfiltrated data. Preparation of the CSIRT early warning (NIS2 · 24h).
Backdoor removal, rebuild of compromised systems from clean sources, perimeter hardening. Full notification to the national CSIRT within 72 hours.
Gradual restoration of operations, reinforced monitoring, final report for board and regulator, permanent hardening recommendations.
The phone is always the fastest channel. But if you can't call right now (crisis meeting, compromised infrastructure, time zone), fill in the form: an analyst will contact you within 15 minutes on the contact details you provide.
Do not include passwords, log dumps, or sensitive data in the form: we will use an encrypted channel after the first contact.
The form is connected to a 24/7 SOC alert: it reaches the on-call team's phones, it doesn't sit in a queue.
If you are a NIS2 essential or important entity, you have strict notification obligations to the national CSIRT. Fortgale prepares the technical notification package (timeline, IoCs, impact analysis) and supports the company's NIS2 contact in their interaction with the national authority.
Containment in 11 minutes is not luck: it's the result of an intel-driven MDR already active. Talk to our analysts about a threat briefing on your sector.
No nurturing sequences, no auto-replies. One of our analysts calls you back within one business day.
The full Report (executive summary · operational IoCs · technical runbook) is restricted. Share two details and one of our analysts contacts you with access and a short technical briefing.