Rapid Triage & Containment
Immediate assessment of scope, threat actor presence and active data exfiltration. Network isolation, endpoint quarantine and credential rotation to stop the bleeding.
Incident Response
24/7 breach containment. Forensic triage. Rapid recovery.
Incident response is the organized approach to detecting, containing, eradicating and recovering from cybersecurity breaches. Sherlock Forensics provides 24/7 incident response for mid-market organizations across Vancouver and British Columbia, covering ransomware, business email compromise, AI-generated phishing campaigns, deepfake social engineering, LLM data exfiltration and nation-state intrusions with NIST SP 800-61 aligned methodology.
When a breach occurs, response time determines outcome. Our incident response team provides immediate containment, forensic evidence preservation, root cause analysis and coordinated recovery - minimizing business disruption while building the evidentiary record needed for legal, regulatory and insurance proceedings.
Capabilities
Immediate assessment of scope, threat actor presence and active data exfiltration. Network isolation, endpoint quarantine and credential rotation to stop the bleeding.
Variant identification, encryption analysis, decryption feasibility assessment, backup integrity verification and coordinated recovery. We help you evaluate all options before making payment decisions.
Investigation of compromised email accounts, mail flow analysis, forwarding rule detection and scope-of-access determination. Identification of accessed data and fraudulent transactions. Analyze exported Outlook mailboxes with Sherlock Forensics PST Viewer for forensic-grade email review.
Forensic imaging, log analysis, memory forensics and malware analysis to determine the attack vector, dwell time, lateral movement and extent of compromise. All evidence follows strict evidence handling procedures from acquisition through analysis. Create forensic disk images with Sherlock Forensics Disk Imager (free, resumable, three-pass SHA-256 verification). For rapid Android triage, Sherlock Forensics Android Acquirer can extract SMS, contacts, call logs and media via ADB.
System rebuilding, data restoration from clean backups, environment hardening and phased return to production. Coordination with IT, legal and executive teams throughout recovery.
Root cause documentation, lessons learned, control gap identification and remediation roadmap. Produce structured findings with our court-ready forensic reports tool. Breach notification support for PIPEDA, BC FIPPA and sector-specific regulations. After containment, the next step is assessment. Find the right security test for your situation.
Active Threats
| Incident Type | Indicators | Response Priority |
|---|---|---|
| Ransomware | Encrypted files, ransom notes, service disruption | Critical - immediate containment |
| Business Email Compromise | Unauthorized mail rules, wire fraud attempts | High - time-sensitive financial exposure |
| Data Exfiltration | Unusual outbound traffic, large data transfers | Critical - active data loss |
| Insider Threat | Unauthorized access, privilege abuse | High - evidence preservation critical |
| Supply Chain Compromise | Malicious updates, compromised vendor access | Critical - scope assessment required |
| Deepfake Social Engineering | Fabricated video/audio, voice clone fraud, synthetic identity impersonation | High - authentication verification, media forensics |
| AI-Generated Phishing | Highly personalized lures, flawless language, scaled spear-phishing campaigns | High - pattern analysis, sender authentication |
| LLM Data Exfiltration | Sensitive data leakage via AI assistants, prompt injection to extract training data or internal documents | Critical - immediate access revocation, scope assessment |
Incident Response Retainer
An incident response retainer gives you a pre-negotiated engagement framework so that when a breach occurs, the response begins immediately - not after contract negotiations, scope discussions and procurement cycles. Test your IR plan under pressure with a tabletop exercise before a real incident forces you to. Check your external attack surface with our free security scorecard.
Frequently Asked Questions
Authority Resources
Our DFIR team holds forensic and incident response credentials.
Related
Legal obligations, notification requirements and recovery steps for Canadian organizations following a data breach.
NIST CSF 2.0 and ISO 27001 aligned risk assessments to quantify your security posture before an incident occurs.
A practical guide to gathering documentation, scoping and preparing your team for a security assessment.
Industry-Specific Response
Each industry faces distinct threat profiles and regulatory requirements during incident response. We tailor our containment and recovery approach to your sector.
Ransomware
Ransomware is the #1 reason organizations call Sherlock Forensics. The first 60 minutes determine whether you contain the attack or lose your network. Our response protocol: isolate affected systems without powering off (preserve volatile memory), block attacker communication channels, preserve forensic evidence for investigation and insurance claims, assess the blast radius to determine what data was accessed. Read our detailed ransomware response guide for the first 60 minutes.
We advise against paying ransoms without first consulting a forensic examiner. Paying does not guarantee data recovery. It does not prevent re-attack. And it may violate sanctions regulations. Sherlock Forensics has recovered data from ransomware incidents without payment by identifying encryption weaknesses, restoring from clean backups and applying decryption tools where available. Organizations that need guaranteed response times should consider an incident response retainer.
Get Started
For non-emergency assessments, order a security audit online.
Order OnlineOur incident response team is available 24/7. Do not wait until Monday morning. Do not power off affected systems. Call now and we will begin triage immediately.
Call 604.229.1994