Emergency Service

INCIDENT
RESPONSE

When an attack is underway, every minute matters. Paragon's incident response team deploys rapidly — containing the breach, preserving evidence, and getting you back to business with minimum damage.

What We Do

Under attack right now? Our incident response team is on standby. Average callback time: under 1 hour during business hours.

<1hr
Emergency Callback
24/7
Retainer Coverage
200+
Incidents Handled
CREST
Certified Responders
NDA
All Engagements
▸ RANSOMWARE RESPONSEData Breach Containment ▸ FORENSIC INVESTIGATIONBusiness Email Compromise ▸ MALWARE ERADICATIONInsider Threat Investigation ▸ EVIDENCE PRESERVATIONPost-Incident Hardening ▸ REGULATORY NOTIFICATIONCrisis Communications ▸ RANSOMWARE RESPONSEData Breach Containment ▸ FORENSIC INVESTIGATIONBusiness Email Compromise ▸ MALWARE ERADICATIONInsider Threat Investigation ▸ EVIDENCE PRESERVATIONPost-Incident Hardening ▸ REGULATORY NOTIFICATIONCrisis Communications
Incident Response Services

FROM FIRST ALERT
TO FULL RECOVERY.

We handle every phase of an incident — detection, containment, eradication, recovery, and hardening — so your team can focus on running the business.

Emergency IR Retainer

Pre-agreed response capability on standby — guaranteed SLA, priority mobilisation, and a named responder who already knows your environment.

24/7 Coverage

Ransomware Response

Rapid containment to stop spread, assessment of encryption scope, decryption options review, negotiation support where required, and full recovery planning.

Most Common Engagement

Data Breach Response

Scope the breach, identify what data was accessed, preserve evidence for regulatory purposes, and support ICO / supervisory authority notification within the 72-hour window.

Regulatory Support

Digital Forensics

Forensically sound evidence collection and analysis — disk imaging, memory forensics, log analysis, and timeline reconstruction for legal proceedings or internal investigation.

Court-Admissible Evidence

Business Email Compromise

Investigation and containment of BEC attacks — account takeover analysis, fraudulent transaction tracing, email rule auditing, and credential reset procedures.

Financial Fraud

Post-Incident Review

Root cause analysis, attack path reconstruction, lessons learned, and a hardening roadmap to prevent recurrence — delivered within 10 days of incident closure.

Prevent Recurrence
Threats We Handle

WE'VE SEEN EVERY ATTACK.

Our responders have handled every major threat type across every sector. Whatever you're facing, we've faced it before.

Ransomware

LockBit, BlackCat, Conti, Cl0p, and novel variants — full containment and recovery

Business Email Compromise

Account takeover, payment fraud, and executive impersonation attacks

Data Exfiltration

Stealth data theft, double extortion, and cloud storage exfil incidents

Supply Chain Attack

Third-party compromise, malicious software updates, and vendor network intrusions

Insider Threat

Malicious and accidental insider incidents — data theft, sabotage, and credential misuse

Advanced Persistent Threat

Nation-state and sophisticated actor intrusions — long-dwell compromise investigations

Response Lifecycle

THE 6-PHASE RESPONSE

Every engagement follows the NIST SP 800-61 incident response lifecycle — adapted for speed in live-attack scenarios.

01
Detection &
Triage
02
Containment
03
Investigation &
Forensics
04
Eradication
05
Recovery
06
Post-Incident
Review

WHAT HAPPENS WHEN YOU CALL

0–1 hr

Initial Contact & Triage

Callback within the hour. Senior responder takes first-pass details, assesses severity, and provides immediate guidance — including whether to isolate systems now.

1–4 hrs

Remote Access & Initial Containment

Secure remote access established. First containment actions taken — network segmentation, account disabling, C2 blocking — to stop the bleeding.

4–24 hrs

Deep Investigation

Full forensic investigation underway — attack vector identification, scope of compromise, data accessed, and attacker persistence mechanisms discovered.

24–72 hrs

Eradication & Recovery

All threat actors and persistence removed. Clean systems restored from verified backups. Regulatory notifications drafted if required. Business resuming.

Day 10

Post-Incident Report

Full written report — root cause, attack timeline, evidence, regulatory obligations met, and hardening roadmap to prevent recurrence.

Ransomware Response

Manufacturing Firm — 420 Employees

LockBit 3.0 attack on production network. Detected Monday 06:42.

340
Endpoints encrypted across 3 sites before initial containment
2.5 hrs
From first call to full network isolation and attacker eviction
18 hrs
To restore critical production systems from verified backups
Attack vector: Unpatched VPN appliance (CVE-2024-21887). Attacker had been dormant inside the network for 11 days before detonating the ransomware payload.
Outcome: No ransom paid. All critical data recovered. ICO notified within 72-hour window. Post-incident hardening programme deployed within 30 days.
Engagement Options

REACTIVE OR RETAINED?

You can call us when something happens — or be first in the queue, with a team that already knows your environment before the incident starts.

Break-Glass

REACTIVE RESPONSE

Call us when you need us — no prior arrangement required

  • Available to any organisation, any time
  • <1hr callback during business hours
  • 4hr SLA for remote access and triage
  • Invoiced per engagement
  • Full IR lifecycle coverage
  • Post-incident report included
Recommended

IR RETAINER

Pre-agreed capability — faster, cheaper, better informed

  • Guaranteed 1hr SLA, 24/7/365
  • Named lead responder pre-assigned
  • Annual environment familiarisation session
  • IR playbook built for your infrastructure
  • Priority queue — retainer clients first
  • Discounted hourly rate vs reactive
  • Quarterly threat intelligence briefings
  • Table-top exercise included annually

COMMON QUESTIONS

Yes — immediately. Uncertainty is normal, and calling early is always better than waiting for confirmation. An attacker can cause exponentially more damage in the hours you spend trying to diagnose the situation internally. Our initial triage is free, and we'll tell you within the first call whether you have an active incident or a false alarm. If it's the latter, you've lost nothing. If it's the former, you've gained critical hours.

This decision depends on multiple factors — your backup integrity, the threat actor involved, data sensitivity, and regulatory position. We never advise paying as a first resort, and in the majority of cases our clients recover without paying. If payment is being considered, it must go through legal counsel and potentially OFSI (UK sanctions) clearance. We provide all the information you need to make an informed decision, but we do not make it for you.

The most important things: don't turn systems off (you'll destroy volatile forensic evidence), don't communicate on potentially compromised email systems, don't reuse any credentials from affected machines, and document everything you've already done. Take photos of screens if needed. Then call us — we'll guide you through the rest in real time. Avoid the temptation to start investigating yourself unless you have trained staff; well-intentioned actions often destroy evidence.

Under UK GDPR, you must notify the ICO within 72 hours of becoming aware of a personal data breach — if it is likely to result in a risk to individuals' rights and freedoms. Not every breach requires notification, but getting this determination wrong carries significant regulatory risk. Paragon assists with the breach assessment and, where required, drafts and submits the ICO notification on your behalf within the mandatory window.

A managed security service (like our Managed Cyber Security offering) monitors your environment continuously and detects threats proactively. An IR retainer is the on-call capability that activates when an incident occurs — whether detected by your SOC, your managed service provider, or your own team. The two complement each other: managed security detects faster, and a retainer ensures expert hands are available the moment something is confirmed.

DON'T WAIT FOR
THE CALL TO PREPARE.

The best time to arrange incident response capability is before you need it. The second best time is right now.