Press ESC to close or Enter to search

Home
About Us
Services
Pricing
Tools
Resources
Contact
Get Started
Live Security Feed
Your IPDetecting...
NCSCUK organisations urged to strengthen cyber defences ALERTPhishing attacks targeting Microsoft 365 users on the rise CISACritical vulnerabilities identified in popular software NEWSRansomware groups increasingly targeting SME businesses NCSCNew guidance released for securing remote workers ALERTBusiness email compromise attacks cost UK firms millions CISAZero-day exploits require immediate patching attention NEWSAI-powered threats becoming more sophisticated in 2025 NCSCUK organisations urged to strengthen cyber defences ALERTPhishing attacks targeting Microsoft 365 users on the rise CISACritical vulnerabilities identified in popular software NEWSRansomware groups increasingly targeting SME businesses NCSCNew guidance released for securing remote workers ALERTBusiness email compromise attacks cost UK firms millions CISAZero-day exploits require immediate patching attention NEWSAI-powered threats becoming more sophisticated in 2025
View Dashboard
Compliance

Do I Need an Incident Response Plan?

Quick Answer

Yes. When (not if) you have a security incident, you need to know who does what, how to contain damage, and how to communicate. Making it up during a crisis leads to mistakes, delays, and worse outcomes. A plan doesn't prevent incidents—it reduces their impact.

Quick answer: Yes. When (not if) you have a security incident, you need to know who does what, how to contain damage, and how to communicate. Making it up during a crisis leads to mistakes, delays, and worse outcomes. A plan doesn't prevent incidents—it reduces their impact.

Why You Need One

Incidents are inevitable

No security is perfect. Even well-protected organisations experience incidents. The question isn't whether, but when.

Chaos costs money

Without a plan:
  • Delays in response (damage increases)
  • Wrong decisions under pressure
  • Communication failures
  • Evidence destroyed accidentally
  • Regulatory timelines missed
  • Recovery takes longer

Regulators expect it

  • ICO expects documented incident response
  • ISO 27001 requires incident management
  • NIS2/CAF mandate incident procedures
  • Cyber insurance often requires it

It's required for compliance

Many frameworks specifically require incident response capability:
  • ISO 27001: A.16 Information security incident management
  • Cyber Essentials: Incident response questions in Plus
  • NIS2: Incident handling requirements
  • GDPR: 72-hour breach notification

What a Plan Should Include

1. Incident classification

Define what's an incident:
  • Severity levels (critical, high, medium, low)
  • Examples of each level
  • Escalation triggers
Example:
  • Critical: Ransomware, active breach, data exfiltration
  • High: Malware detected, suspected compromise
  • Medium: Phishing click (no confirmed compromise)
  • Low: Blocked attack, policy violation

2. Roles and responsibilities

Who does what:
  • Incident commander: Overall coordination
  • Technical lead: Technical investigation and containment
  • Communications lead: Internal and external communications
  • Legal/compliance: Regulatory obligations
  • Business lead: Business impact decisions
Contact details: Phone numbers, alternates, escalation paths.

3. Response procedures

Phase 1: Detection and analysis
  • How to identify incidents
  • Initial triage
  • Evidence preservation
  • Scope assessment
Phase 2: Containment
  • Isolate affected systems
  • Prevent spread
  • Preserve evidence
Phase 3: Eradication
  • Remove threat
  • Identify root cause
  • Patch vulnerabilities
Phase 4: Recovery
  • Restore systems
  • Verify clean state
  • Return to normal operations
Phase 5: Lessons learned
  • Post-incident review
  • Documentation
  • Improvements identified

4. Communication templates

Pre-drafted communications:
  • Internal notification
  • Customer notification
  • Regulatory notification
  • Press statement (if needed)
  • Partner/supplier notification
Don't write these during a crisis.

5. External contacts

Who you might need:
  • Cyber insurance claims line
  • Legal counsel
  • Forensics provider
  • PR/crisis communications
  • Law enforcement
  • ICO (if breach)
  • Industry regulator

6. Technical procedures

Specific runbooks:
  • Ransomware response
  • Business email compromise
  • Data breach
  • Malware outbreak
  • Account compromise
Step-by-step technical actions for common scenarios.

How to Create One

Start simple

A basic plan is better than no plan. You can improve it over time.

Base on frameworks

NIST Incident Response, ISO 27035, SANS provide proven structures.

Involve stakeholders

IT can't create this alone. Legal, HR, communications, business units need input.

Test it

Plans untested are assumptions. Tabletop exercises reveal gaps.

Keep it updated

Contacts change. Systems change. Review at least annually.

What We Provide

We help clients develop and test incident response:

Plan development:

  • Templated framework customised to your organisation
  • Roles and responsibilities defined
  • Communication templates created
  • Runbooks for common scenarios
Testing:
  • Tabletop exercises
  • Findings and improvements
  • Regular review and updates
Response support:
  • When incidents occur, we're there
  • Technical investigation
  • Containment and recovery
  • Coordination with external parties
Having a plan matters. Having a partner who's been through incidents matters more.

---

about preparation and response.

---