Experiencing a breach?
Send the essentials below. We’ll triage quickly and call you back.
What happens next?
- We acknowledge your request and confirm a call time.
- Establish a secure comms channel and collect initial indicators.
- Guide immediate containment steps and begin evidence collection.
Tips while you wait
- Avoid powering off impacted endpoints (suspend/sleep is OK).
- Preserve logs and export alerts where possible.
- Do not pay ransoms or contact threat actors.