Data Breach Response

Website-Design-DF_Data Exfiltration.jpg (2)

A data breach occurs when a cybercriminal, or bad actor, successfully exfiltrates or steals classified data, such as Personal Identifiable Information (PII), Personal Financial Information (PFI), or Personal Health Information (PHI) from an organization. 

When a cybersecurity incident occurs, like a data breach, Envista immediately begins a cybersecurity investigation and determines if there is evidence that an organization was in fact successfully attacked by a cybercriminal and data was exfiltrated.  The assessment of the compromise includes multiple steps in establishing the type of attack, how the attack took place, the extent of the damage, what may have been compromised, and what that means for the insured and other affected parties.  

Envista's cybersecurity analysts utilize the most technologically advanced software, tools and expertise to respond, collect, preserve, and analyze digital evidence to uncover the root cause of cyber incidents.

Data Breach Incident Response Plan 

 During an investigation, our experts can determine and find answers to questions such as: 

  • How did the breach occur? 
  • When did the incident take place? 
  • What data was compromised? 
  • Was the attack targeted or indiscriminate? 
  • Where did the confidential information, trade secrets or customer information go?                       
  • Who is behind the attack or loss? 
  • Who is responsible for security failures? 

Once the cybercrime has been accurately diagnosed, our team of cybersecurity and digital forensics experts then analyze digital evidence and determine if the data loss can be recovered through performing a data exfiltration analysis – at this stage of the investigation, our experts are engaged to determine how the data was stolen, if there is evidence the data is still being stolen, and the total exposure. 

Types of Data Breaches 

Our team has investigated losses spanning multiple industries from legal, to corporate, to manufacturing to small business.  Breaches occur to any and all types of businesses across the globe.  Our team can assist corporations, breach coaches, attorneys, claim professionals and others with investigations surrounding:  

  • Trade secret/intellectual property theft 
  • Internet libel/content injury 
  • Extortion 
  • Cryptocurrency
  • Network loss or damage/hacker malfeasance 
  • Business interruption 
  • Accidental loss 
  • Internal usage policy violations 

At Envista, we believe our expertise is best utilized in the context of your data breach response team. To that end, we are available to help you, or your clients, prepare your response plan, and be positioned as trusted advisers on your team; well prepared to respond with computer forensics analysis when needed. The application of a sound forensics analysis is a critical component to any defensible cyber response.