Under Attack?
Send your situation report to us via the Incident Response Web Form, and we will get back to you as soon as we can*.
Do I need to be a current client to use the Web Form?
No, our Incident Response Web Form is available to both existing clients and new customers experiencing a cyber emergency.
What types of incidents can HUNT-IR assist with?
We handle a wide range of cybersecurity incidents, including but not limited to, ransomware attacks, data breaches, malware infections, business email compromises, and denial-of-service attacks.
Is the service confidential?
Yes, confidentiality is a top priority for us. All information shared with our team is handled with the utmost discretion and integrity.
What to expect once you've submitted a Form
When you use our Incident Response Web Form to engage with HUNT-IR, you can expect a systematic and thorough approach to addressing your cyber incident*:
Initial Assessment: Our experts will gather essential information about the incident to understand the scope and nature of the threat.
Detailed Investigation: Our team will conduct a comprehensive investigation to identify the root cause and extent of the incident.
Post-Incident Review: We will provide a detailed report and recommendations to prevent future incidents.
*Submitting a response via the Incident Response Web Form does not secure or guarantee the delivery of HUNT-IR Incident Response Services. Replies to form responses from HUNT-IR are made on a best-effort basis and are also not guaranteed.