Incident Response
Our structured approach to managing and mitigating security incidents to protect our customers and infrastructure.
Subsidiary Disclosure: HUK SONS IT operates as a legally separate subsidiary of HUK SONS. When you engage with this site or our services, you are interacting with HUK SONS IT (a subsidiary of HUK SONS) as the contracting entity, unless a signed agreement specifies otherwise.
Response Lifecycle
We follow the NIST Computer Security Incident Handling Guide (SP 800-61) framework.
Preparation
Establishing response capabilities, training, and preventive measures.
Detection
Continuous monitoring and analysis of security events.
Containment
Isolating affected systems to prevent further damage.
Eradication
Removing the root cause and malware from the environment.
Recovery
Restoring systems to normal operation and verifying integrity.
Post-Incident
Analyzing the incident to improve future response.
Severity Classification
How we categorize and prioritize security incidents.
Critical
Critical business impact, data breach, or widespread outage.
High
Significant impact, partial outage, or high-risk vulnerability.
Medium
Moderate impact, degraded performance, or isolated issue.
Low
Minor impact, cosmetic issue, or informational event.
Report a Security Incident
If you suspect a security incident or vulnerability involving HUK SONS IT systems, please report it immediately. We operate 24/7/365.