{"id":781,"date":"2026-01-15T15:45:58","date_gmt":"2026-01-15T15:45:58","guid":{"rendered":"https:\/\/zencybersecurity.com\/?post_type=product&#038;p=781"},"modified":"2026-01-15T15:46:22","modified_gmt":"2026-01-15T15:46:22","slug":"incident-response-now","status":"publish","type":"product","link":"https:\/\/zencybersecurity.com\/index.php\/product\/incident-response-now\/","title":{"rendered":"Incident Response Now"},"content":{"rendered":"<p>We understand what it is like to have everything you&#8217;re working for be held in jeopardy by bad actors actively exploiting your environment.\u00a0 Zen Cyber Security Incident Response (IR) Engineers have led IR actions with customers that have over 100,000 employees.\u00a0 We have performed IR actions in multiple verticals to include banking, manufacturing, services sales, grocery stores, schools, and many more.\u00a0 There is not an environment that you put us in that we can not assess very quickly to immediately start our IR process.\u00a0 We follow the National Institute of Standards and Technology (NIST) incident response process outlined in SP 800-61. Here are the high level highlights:<\/p>\n<ul>\n<li>Preparation &#8211; this occurs prior to an incident occurring and focuses on preparing for incidents.\u00a0 Practically this means our engineers train on our process and study new\/emerging threats<\/li>\n<li>Detection and Analysis &#8211; we will have an initial meeting to understand the incident from the customer, review any logs the customer may be able to provide, install our security tools for analysis, review our logs, prioritize remediation of devices based on risk and business critical function.<\/li>\n<li>Containment, Eradication and Recovery &#8211; isolate systems to reduce spread\/impact, remove the threats, recover the system<\/li>\n<li>Post-Incident Activity &#8211; attempt to provide a root cause analysis, update our policies and procedures, and share the results with the customer<\/li>\n<\/ul>\n<p>We are here to make your recovery go as smoothly as possible.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This service covers up to 10 devices in your environment.\u00a0 If you have more devices than that please adjust the quantity as necessary.<\/p>\n<p>You will have an Incident Response (IR) Engineer reach out to you within 3 business hours of purchasing this service during standard business hours.\u00a0 Standard business hours are 7 AM to 7 PM CST.<\/p>\n<p>We are not responsible for your data.\u00a0 That means if your data is lost in the process of recovering your system Zen Cyber Security Inc is not liable.\u00a0 However, we have been doing this for a very long time and we will let you know up front if that is a risk.\u00a0 If systems need to be reimaged.\u00a0 That is a customer responsibility.<\/p>\n<p>This is a remote engagement.<\/p>\n","protected":false},"featured_media":780,"comment_status":"open","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"off","neve_meta_content_width":100,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"product_brand":[],"product_cat":[20],"product_tag":[],"class_list":{"0":"post-781","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-service","8":"first","9":"instock","10":"virtual","11":"purchasable","12":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/product\/781","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/comments?post=781"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/media\/780"}],"wp:attachment":[{"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/media?parent=781"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/product_brand?post=781"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/product_cat?post=781"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/zencybersecurity.com\/index.php\/wp-json\/wp\/v2\/product_tag?post=781"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}