Q · 01How fast can you respond to a cyber incident?+
The Memphis command center picks up on the DFIR hotline 24/7 at an average 2.1 rings. Retainer clients get a guaranteed initial-triage call within 45 minutes of intake — a senior responder on a bridge, scoping the event, pulling history, and giving you the first set of containment instructions. Containment actions kick off within four hours of engagement. On-call clients are best-effort on the same steps but without the SLA. We do not require you to wait for a contract to sign before we start triage on a retainer — that’s the point of the retainer. For on-call engagements, the MSA is e-signed on the triage bridge before billable forensic work begins.
Q · 02Do you negotiate with ransomware actors?+
We do not pay ransoms on your behalf and we do not hold ourselves out as a ransomware-negotiation firm. What we do is coordinate with specialist negotiation vendors already on your cyber-insurer’s approved panel — or recommended ones if you don’t have a policy — manage the communication channel, preserve the forensic evidence while talks are ongoing, and ensure every action taken is documented in a way your insurer, your breach coach, and law enforcement can use later. Payment decisions sit with you and your counsel; OFAC sanctions screening is mandatory before any funds move, and a sanctioned-entity match generally takes the pay option off the table entirely. Our role is containment, forensics, and the written record — not counterparty communication with the adversary.
Q · 03Do you pay the ransom for us?+
No. We are not a licensed money-services business, we do not wire cryptocurrency on behalf of clients, and we would not recommend a firm that did so without proper licensing and OFAC compliance. If the decision is made to pay — with your counsel, insurer, and board aligned — the payment is executed by a specialist vendor with MSB licensing, sanctions screening, and wallet-attribution protocols. We facilitate the vendor handoff and retain the forensic record of the transaction so the event is fully documented for your carrier, your auditors, and any subsequent litigation. The decision to pay and the legal liability for paying are yours; our role is preserving the record.
Q · 04Do you work with my cyber insurer?+
Yes. Cyber-insurance policies almost always require the carrier to approve the incident-response vendor before covered costs start accruing — choose the wrong firm first and the claim is denied. We coordinate with the carrier’s breach coach (typically panel counsel), confirm that our engagement falls inside the approved-vendor list or seek a one-time waiver, and scope our work to match the policy’s covered-cost categories so your claim tracks cleanly. We have worked alongside the major cyber carriers and breach-coach firms on more than one engagement, and we understand the reporting cadence they expect — daily status updates, written hour-24 brief, hour-72 preliminary examiner report, final report on engagement close. On a retainer we pre-confirm our approved-vendor position with your carrier at policy renewal, so the question is settled before the incident happens.
Q · 05What evidence do you preserve, and how?+
For every engagement we produce bit-for-bit forensic images of affected systems using industry-standard tooling — EnCase, FTK Imager, or Magnet Axiom depending on the target — with cryptographic hash verification (SHA-256 minimum, MD5 alongside for legacy court exhibits) recorded at acquisition. Volatile memory is captured live when the system is still powered, using Volatility, Rekall, or KAPE depending on the platform. Every artifact is logged to a written chain-of-custody sheet with the acquirer’s name, timestamp, hash, and handoff record; physical evidence is stored in tamper-evident bags in our Memphis evidence locker until the matter closes or counsel directs transfer. Network logs, endpoint telemetry, email gateway records, and cloud audit trails are pulled per a written preservation plan tailored to the matter, with retention-window analysis so nothing ages out mid-engagement.
Q · 06Can you testify in court?+
Yes. Our senior responders maintain the credentials and methodology discipline needed to qualify as expert witnesses — our team is building toward GIAC GCFA (Certified Forensic Analyst) and GCIH (Certified Incident Handler) as team-level credentials, and our senior lead carries prior experience testifying in civil employment and breach matters. We write every engagement as if it will end in deposition: documented methodology, reproducible workstation builds, version-pinned tooling, written chain-of-custody from the first acquisition forward, and a signed examiner report. If your matter heads to litigation, the forensic artifacts and reports we produce are built to travel. We do not overstate our bench — our team is actively expanding its certification footprint, and we are transparent with counsel about which responder on a matter holds which credentials.
Q · 07What is the difference between an MDR service and an IR retainer?+
Managed Detection and Response (MDR) is the 24/7 tripwire — it watches your endpoints, your network, and your cloud for malicious activity and alerts you when something is happening. Incident Response (IR) is what happens after the tripwire fires. An IR retainer means the responders — the people who actually go into a ransomware-encrypted domain controller and figure out how the adversary got in — are pre-engaged with a guaranteed SLA and a pre-executed MSA, so the clock-starts-now phase of a crisis doesn’t stall in procurement. MDR tells you there’s a fire; IR puts it out. Most mid-sized organizations carry both. We offer both — see our Managed SOC page for the MDR side of the same command center.
Q · 08Do you handle business email compromise (BEC) wire-fraud recovery?+
Yes, and the first 72 hours matter enormously. On a BEC wire-fraud report, we immediately coordinate three parallel workstreams. First, a FinCEN Rapid Response Program filing through your bank to attempt funds recall — your bank’s fraud department is the right channel, and the faster they get the request the more likely the correspondent bank holds the funds. Second, an IC3 complaint to the FBI’s Internet Crime Complaint Center — IC3 is the gateway for the FBI’s Financial Fraud Kill Chain on wires above $50,000 that left the US in the last 72 hours, and the Kill Chain team has a meaningful track record on funds recall when activated in time. Third, a forensic investigation of the compromised mailbox to identify the intrusion vector (typically credential theft plus MFA bypass or a forwarding rule), establish the attacker’s dwell time, and rule out other compromised accounts in your tenant. Wire-fraud recovery rates fall sharply after 72 hours, so the value of the service is speed.
Q · 09Can you handle insider-threat investigations?+
Yes. Insider investigations — departing-employee data theft, privileged-user abuse, financial fraud by staff, harassment via corporate systems — are a significant share of the DFIR caseload and they require more discipline, not less, because the outcome often lands in employment or civil litigation. We work under privilege via your outside counsel (Upjohn warnings where applicable), follow a written preservation plan before any collection, preserve the employee’s system before termination paperwork is signed where possible so the collection is clearly within scope of the employment relationship, and produce an examiner report suitable for an arbitration or court setting. Every insider engagement is scoped in writing with counsel before collection starts — we do not start imaging systems on a verbal instruction.
Q · 10How do breach-notification deadlines actually work?+
Breach-notification law in the US is a patchwork. If PHI (protected health information) is involved, HIPAA’s Breach Notification Rule gives you 60 days from discovery to notify affected individuals and HHS OCR — and breaches of 500 or more individuals go on the OCR public wall of shame within a similar window. Financial-services firms face GLBA Safeguards Rule notification (revised FTC rule, 30-day window to the FTC for breaches affecting 500+ consumers). All 48 US states with breach-notification laws have their own timing — many as short as 30 days, a few require law-enforcement notification alongside, and state attorney general thresholds vary widely. Public companies face SEC Form 8-K Item 1.05 within four business days of determining materiality. We do not practice law, but we produce the forensic record a breach coach needs to calendar the right deadlines — affected-individual counts, data categories, dwell time, evidence of exfiltration versus mere access — and we coordinate with panel counsel on the timeline.
Q · 11What about state attorney general notification?+
Most of the 48 state breach-notification statutes require notification to the state attorney general’s office — sometimes only above a threshold of affected residents (California: 500+, New York: any, Texas: 250+), sometimes always. A few require credit-reporting agency notification on top. The notification letters themselves have content requirements that differ by state — Massachusetts, for instance, prohibits naming the specific type of data involved in the initial consumer letter, while Tennessee allows it. Your breach coach drives the paperwork; we drive the forensic record that the paperwork is built on, delivered in the format counsel uses.
Q · 12Do you have an on-site response capability or is this all remote?+
Both. The majority of DFIR work — endpoint triage, log analysis, memory forensics, email search — is done remotely with your consent and with client-owned collection agents or our forensic toolkit deployed to your environment. Where physical collection is required — a locked-out domain controller, an air-gapped OT network, physical evidence that must be hand-walked to preserve chain-of-custody — we dispatch a responder to any site in Tennessee or Mississippi inside the same business day. Our Memphis command center is the single point of coordination for both the remote workstream and the physical dispatch. The cyber responder on the bridge and the uniformed officer walking the server room report to the same dispatch, run the same timeline, and hand you a single written record at engagement close. One command.