Incident Response

Every five minutes, a hacker reports a security vulnerability. When a hacker contacts your organization, NEXGAP can help you plan your next steps — from communication to resolution. And if you, as a hacker, want to report a vulnerability you have discovered, NEXGAP can help you notify the appropriate parties through our Incident Response.

Should your company be blackmailed or threatened, you should contact a police department as soon as possible. For more information, visit the webpage the Federal Criminal Police Office (Central Police Cybercrime Contact Points).

Make thoughtful decisions, keep calm — The smart way forward

If a hacker has contacted your company, it's important not to make hasty decisions. In such situations, prudence and a structured approach are crucial. At NEXGAP, we are happy to help you overcome this challenge. Our experts can help you plan all necessary steps and professionally coordinate communication with the hacker. We understand that an appropriate response to such incidents is essential to ensure the safety of your organization with Incident Response
Ausrufezeichen
Before taking action, it is imperative that a thorough investigation is carried out to determine whether it is indeed a malicious attack or whether the irregularities found are due to other causes. A hasty response could result in unnecessary operational disruptions or false security alerts that could divert our resources and attention from actual threats.
Enter contact details or if criticality is high
call
We would like to inform you that we handle the information you entrust to us with the utmost care and confidentiality. Your trust is paramount to us and we are aware of the responsibility that comes with handling your sensitive data. For more information, please visit our manifesto remove.
We have received your message and will get back to you as soon as possible.
Something went wrong. Please try again at another time.

In the event of a compromise: Act strategically

Unfortunately, threats such as ransomware, phishing, and DDoS attacks are not uncommon in our digital world. It's important that you know how to react if your systems are compromised. In all cases, it is important to document the incident and learn from experience. Review your safety protocols and update your emergency plans accordingly. Working with an experienced IT security team can be crucial to effectively manage such incidents and protect your systems.
What you should do if you have a DDoS
What you should do about ransomware
What you should do when it comes to phishing
+49 (0) 69 469 92 547
You can reach us during our business hours from 09:00 to 17:00 CET
legal@nexgap.com
For general inquiries or additional information about our company
sales@nexgap.com
If you have any questions about our products or services
press@nexgap.com
For press matters, please email our press team
¹
We grant you a non-exclusive, non-transferable and limited right to access and display the web pages contained in this website as a customer or potential customer of “NEXGAP” and/or a subsidiary, provided that you comply with these terms of use and retain all copyright, trademark, and other proprietary notices. For more information, please see our terms of use.
²
Please do not send any confidential or copyrighted information to us via this website. Please note that we consider any information or material that reaches us in this way to be non-confidential. When you send us information or materials, you grant “NEXGAP” and/or its affiliates an unrestricted, irrevocable right to copy, reproduce, publish, load, provide, repost, distribute, publish, perform, modify, use to create derivative works, and otherwise use or process them indefinitely. Personal data that you provide to deliver products and/or services is processed in accordance with our privacy policy. For more information about the privacy policy, please here.
NEXGAP © 2024. All rights reserved.
Online
Threads
Instagram IconLinkedIn Icon
Incident and response in case of contact with hackers
¹
We grant you a non-exclusive, non-transferable and limited right to access and display the web pages contained in this website as a customer or potential customer of “NEXGAP” and/or a subsidiary, provided that you comply with these terms of use and retain all copyright, trademark, and other proprietary notices. For more information, please see our terms of use.
²
Please do not send any confidential or copyrighted information to us via this website. Please note that we consider any information or material that reaches us in this way to be non-confidential. When you send us information or materials, you grant “NEXGAP” and/or its affiliates an unrestricted, irrevocable right to copy, reproduce, publish, load, provide, repost, distribute, publish, perform, modify, use to create derivative works, and otherwise use or process them indefinitely. Personal data that you provide to deliver products and/or services is processed in accordance with our privacy policy. For more information about the privacy policy, please here.
NEXGAP © 2024. All rights reserved.
We have received your description and will respond to your request as soon as possible.
Please try again later.
NEXGAP Logo
Wiederkehrend
Rotate your smartphone or tablet by 90°
“NEXGAP” uses cookies — small text files that record information about your visit. You can agree to our use of cookies by clicking “Accept all,” or you can adjust which cookies we can use by clicking on”Manage settings” click. You can change your preferences at any time by clicking “Cookie Settings” at the bottom of any page.