{"id":19879,"date":"2024-02-09T10:55:00","date_gmt":"2024-02-09T09:55:00","guid":{"rendered":"https:\/\/www.nextron-systems.com\/?page_id=19879"},"modified":"2025-04-04T14:07:11","modified_gmt":"2025-04-04T12:07:11","slug":"incident-response","status":"publish","type":"page","link":"https:\/\/www.nextron-systems.com\/incident-response\/","title":{"rendered":"Incident Response"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Section&#8221; module_class=&#8221;nextron-div-bottom&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/12\/nextron-incidence-response-header-blur.jpg&#8221; parallax=&#8221;on&#8221; parallax_method=&#8221;off&#8221; custom_padding=&#8221;5%||5%||false|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; custom_css_main_element=&#8221;align-items: center;&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;20px&#8221; header_font_size=&#8221;60px&#8221; header_font_size_tablet=&#8221;60px&#8221; header_font_size_phone=&#8221;60px&#8221; header_font_size_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Have you been attacked by a <span style=\"color: #009ec7;\">hacker<\/span>?<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;20px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"padding-bottom: 0px;\">Time is critical. Our assessments deliver the insights you need to make informed decisions and limit damage.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/AdobeStock_486860921_2-scaled.jpeg&#8221; title_text=&#8221;Anonymous computer trespasser hacking database&#8221; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;450px&#8221; max_width_tablet=&#8221;250px&#8221; max_width_phone=&#8221;250px&#8221; max_width_last_edited=&#8221;off|desktop&#8221; module_alignment=&#8221;right&#8221; custom_css_free_form=&#8221;selector {||  background-color: #fff;||  padding: 2px;||  clip-path: polygon(0% 0%, 80% 0%, 100% 20%, 100% 100%, 20% 100%, 0% 80%);||}||||selector img {||  clip-path: polygon(0% 0%, 80% 0%, 100% 20%, 100% 100%, 20% 100%, 0% 80%);||}&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Section&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; background_enable_image=&#8221;off&#8221; parallax=&#8221;on&#8221; parallax_method=&#8221;off&#8221; custom_margin=&#8221;||||false|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;60px||60px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; custom_css_main_element=&#8221;align-items: center;&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/AdobeStock_651549770_2-scaled.jpeg&#8221; title_text=&#8221;AdobeStock_651549770_2&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;450px&#8221; max_width_tablet=&#8221;250px&#8221; max_width_phone=&#8221;250px&#8221; max_width_last_edited=&#8221;off|desktop&#8221; module_alignment=&#8221;left&#8221; custom_css_free_form=&#8221;selector {||  background-color: #fff;||  padding: 2px;||  clip-path: polygon(0% 0%, 80% 0%, 100% 20%, 100% 100%, 20% 100%, 0% 80%);||}||||selector img {||  clip-path: polygon(0% 0%, 80% 0%, 100% 20%, 100% 100%, 20% 100%, 0% 80%);||}&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; header_font_size=&#8221;40px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Uncover Hidden Threats, Minimize Damage.<\/h1>\n<p>Even the most robust IT security measures can encounter sophisticated hacker activity. When a breach occurs, fast, detailed assessments are crucial to understanding the scope, minimizing damage, and implementing targeted countermeasures to prevent future incidents.<\/p>\n<p>Nextron\u2019s Continuous Compromise Assessment integrates seamlessly into your security operations, offering detailed insights into advanced hacking activity often missed by conventional tools.[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Section&#8221; module_id=&#8221;dl-guide&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;rgba(0,22,31,0.6) 0%|rgba(0,22,31,0.6) 100%&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; background_image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/12\/nextron-threat-detection-registration.jpg&#8221; parallax=&#8221;on&#8221; parallax_method=&#8221;off&#8221; da_popup_slug=&#8221;dl-guide&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;60px||60px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; custom_css_main_element=&#8221;align-items: center;&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/02\/guide-cover-2.png&#8221; title_text=&#8221;guide-cover-2&#8243; disabled_on=&#8221;off|off|on&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;450px&#8221; max_width_tablet=&#8221;250px&#8221; max_width_phone=&#8221;250px&#8221; max_width_last_edited=&#8221;off|desktop&#8221; module_alignment=&#8221;left&#8221; custom_css_free_form=&#8221;selector {||  background-color: #fff;||  padding: 2px;||  clip-path: polygon(0% 0%, 80% 0%, 100% 20%, 100% 100%, 20% 100%, 0% 80%);||}||||selector img {||  clip-path: polygon(0% 0%, 80% 0%, 100% 20%, 100% 100%, 20% 100%, 0% 80%);||}&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; header_font_size=&#8221;40px&#8221; custom_css_free_form=&#8221;selector h1 {||  margin-bottom: 20px;||}&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>In our <span style=\"color: #009ec7;\">Best Practice Guide<\/span>,<br \/>\nyou will discover:<\/h1>\n<ul>\n<li>How to accelerate threat identification and enhance the depth of your analysis in just 6 steps using Nextron&#8217;s solutions.<\/li>\n<li>What enables Nextron to uncover hidden traces of hacker activity missed by conventional tools.<\/li>\n<li>How Nextron\u2019s global partner network provides immediate support in the event of a security incident.<\/li>\n<\/ul>\n<p>Interested in learning more? Download our Best Practice Guide for clear, actionable insights into how Nextron adds value to your cybersecurity operations.[\/et_pb_text][et_pb_button button_url=&#8221;#download-guide&#8221; button_text=&#8221;Download Guide&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/02\/guide-cover-2.png&#8221; title_text=&#8221;guide-cover-2&#8243; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;450px&#8221; max_width_tablet=&#8221;250px&#8221; max_width_phone=&#8221;250px&#8221; max_width_last_edited=&#8221;off|desktop&#8221; module_alignment=&#8221;right&#8221; custom_css_free_form=&#8221;selector {||  background-color: #fff;||  padding: 2px;||  clip-path: polygon(0% 0%, 80% 0%, 100% 20%, 100% 100%, 20% 100%, 0% 80%);||}||||selector img {||  clip-path: polygon(0% 0%, 80% 0%, 100% 20%, 100% 100%, 20% 100%, 0% 80%);||}&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Section&#8221; module_id=&#8221;first-steps&#8221; module_class=&#8221;nextron-div-top nextron-div-bottom&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; da_popup_slug=&#8221;first-steps&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;1_5,3_5,1_5&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; header_font_size=&#8221;40px&#8221; text_orientation=&#8221;center&#8221; custom_css_free_form=&#8221;selector h1 {||  margin-top: 0px;||}&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>\u200bFirst Steps to Take After<br \/>\nIdentifying an Incident<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_5&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Stay Calm and Assess the Situation&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/05\/landing07.png&#8221; image_icon_width=&#8221;65px&#8221; icon_alignment=&#8221;left&#8221; _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h3&#8243; header_font_size=&#8221;22px&#8221; body_line_height=&#8221;1.6em&#8221; body_link_text_color=&#8221;#ffffff&#8221; background_color=&#8221;#15242a&#8221; background_enable_image=&#8221;off&#8221; min_height=&#8221;450px&#8221; custom_padding=&#8221;50px|30px|50px|30px|false|false&#8221; custom_css_blurb_title=&#8221;max-width: 200px;&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#009EC7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;30px&#8221; box_shadow_spread=&#8221;-10px&#8221; box_shadow_color=&#8221;#009EC7&#8243; global_colors_info=&#8221;{}&#8221; background__hover_enabled=&#8221;off|desktop&#8221; use_background_color_gradient__hover=&#8221;off&#8221; background_color_gradient_overlays_image__hover=&#8221;on&#8221; background_enable_image__hover=&#8221;off&#8221; custom_css_blurb_title_last_edited=&#8221;on|tablet&#8221; custom_css_blurb_title_tablet=&#8221;max-width: 100%;&#8221; custom_css_blurb_title_phone=&#8221;max-width: 100%;&#8221;]Gather as much information as possible on its nature, scope, and impact without making rushed decisions.[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Isolate Affected Systems&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/05\/landing08.png&#8221; image_icon_width=&#8221;65px&#8221; icon_alignment=&#8221;left&#8221; _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h3&#8243; header_font_size=&#8221;22px&#8221; body_line_height=&#8221;1.6em&#8221; body_link_text_color=&#8221;#ffffff&#8221; background_color=&#8221;#15242a&#8221; background_enable_image=&#8221;off&#8221; min_height=&#8221;450px&#8221; custom_padding=&#8221;50px|30px|50px|30px|false|false&#8221; custom_css_blurb_title=&#8221;max-width: 200px;&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#009EC7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;30px&#8221; box_shadow_spread=&#8221;-10px&#8221; box_shadow_color=&#8221;#009EC7&#8243; global_colors_info=&#8221;{}&#8221; background__hover_enabled=&#8221;off|desktop&#8221; use_background_color_gradient__hover=&#8221;off&#8221; background_color_gradient_overlays_image__hover=&#8221;on&#8221; background_enable_image__hover=&#8221;off&#8221; custom_css_blurb_title_last_edited=&#8221;on|tablet&#8221; custom_css_blurb_title_tablet=&#8221;max-width: 100%;&#8221; custom_css_blurb_title_phone=&#8221;max-width: 100%;&#8221;]Immediately isolate any compromised systems by disconnecting them from the network and disabling remote access. Avoid shutting down systems to preserve evidence.[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Document Everything&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/05\/landing09.png&#8221; image_icon_width=&#8221;65px&#8221; icon_alignment=&#8221;left&#8221; _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h3&#8243; header_font_size=&#8221;22px&#8221; body_line_height=&#8221;1.6em&#8221; body_link_text_color=&#8221;#ffffff&#8221; background_color=&#8221;#15242a&#8221; background_enable_image=&#8221;off&#8221; min_height=&#8221;450px&#8221; custom_padding=&#8221;50px|30px|50px|30px|false|false&#8221; custom_css_blurb_title=&#8221;max-width: 150px;&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#009EC7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;30px&#8221; box_shadow_spread=&#8221;-10px&#8221; box_shadow_color=&#8221;#009EC7&#8243; global_colors_info=&#8221;{}&#8221; background__hover_enabled=&#8221;off|desktop&#8221; use_background_color_gradient__hover=&#8221;off&#8221; background_color_gradient_overlays_image__hover=&#8221;on&#8221; background_enable_image__hover=&#8221;off&#8221; custom_css_blurb_title_last_edited=&#8221;on|tablet&#8221; custom_css_blurb_title_tablet=&#8221;max-width: 100%;&#8221; custom_css_blurb_title_phone=&#8221;max-width: 100%;&#8221;]Record every action taken, along with all observations, dates, times, and details of the breach. This documentation is essential for analyzing the breach and guiding future actions.[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Notify the Incident Response Team&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/05\/landing10.png&#8221; image_icon_width=&#8221;65px&#8221; icon_alignment=&#8221;left&#8221; _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h3&#8243; header_font_size=&#8221;22px&#8221; body_line_height=&#8221;1.6em&#8221; body_link_text_color=&#8221;#ffffff&#8221; background_color=&#8221;#15242a&#8221; background_enable_image=&#8221;off&#8221; min_height=&#8221;440px&#8221; custom_padding=&#8221;50px|30px|50px|30px|false|false&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#009EC7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;30px&#8221; box_shadow_spread=&#8221;-10px&#8221; box_shadow_color=&#8221;#009EC7&#8243; global_colors_info=&#8221;{}&#8221; background__hover_enabled=&#8221;off|desktop&#8221; use_background_color_gradient__hover=&#8221;off&#8221; background_color_gradient_overlays_image__hover=&#8221;on&#8221; background_enable_image__hover=&#8221;off&#8221; custom_css_blurb_title_last_edited=&#8221;off|desktop&#8221; custom_css_blurb_title_tablet=&#8221;max-width: 100%;&#8221; custom_css_blurb_title_phone=&#8221;max-width: 100%;&#8221;]Notify the incident response team promptly. Early involvement allows for preliminary assessments and helps mitigate potential impacts.[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Change All Credentials&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/05\/landing11.png&#8221; image_icon_width=&#8221;65px&#8221; icon_alignment=&#8221;left&#8221; _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h3&#8243; header_font_size=&#8221;22px&#8221; body_line_height=&#8221;1.6em&#8221; body_link_text_color=&#8221;#ffffff&#8221; background_color=&#8221;#15242a&#8221; background_enable_image=&#8221;off&#8221; min_height=&#8221;440px&#8221; custom_padding=&#8221;50px|30px|50px|30px|false|false&#8221; border_width_all=&#8221;2px&#8221; border_color_all=&#8221;#009EC7&#8243; box_shadow_style=&#8221;preset1&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;30px&#8221; box_shadow_spread=&#8221;-10px&#8221; box_shadow_color=&#8221;#009EC7&#8243; global_colors_info=&#8221;{}&#8221; background__hover_enabled=&#8221;off|desktop&#8221; use_background_color_gradient__hover=&#8221;off&#8221; background_color_gradient_overlays_image__hover=&#8221;on&#8221; background_enable_image__hover=&#8221;off&#8221; custom_css_blurb_title_last_edited=&#8221;off|desktop&#8221; custom_css_blurb_title_tablet=&#8221;max-width: 100%;&#8221; custom_css_blurb_title_phone=&#8221;max-width: 100%;&#8221;]<\/p>\n<p>Review and reset passwords, especially for critical systems and accounts that may have been accessed. Coordinate password changes with other remediation steps, such as identifying and removing backdoors. Enable multi-factor authentication wherever possible to improve security.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_3,1_3&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||50px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; custom_css_main_element=&#8221;align-items: center;&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.3&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.4em&#8221; header_font=&#8221;|||on|||||&#8221; max_width=&#8221;640px&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; custom_css_free_form=&#8221;@media screen and ( min-width: 980px ) {||  selector {||  \tbackground-image: url(\/wp-content\/uploads\/2023\/12\/nextron-icon-rocket-launch.png);||    background-repeat: no-repeat;||    background-size: 80px auto;||    background-position: left calc(50% &#8211; 10px);||    padding-left: 280px;||\t}||}&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Get helped now with our Best Practice Guide!<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;#download-guide&#8221; button_text=&#8221;Download Guide&#8221; button_alignment=&#8221;right&#8221; button_alignment_tablet=&#8221;left&#8221; button_alignment_phone=&#8221;left&#8221; button_alignment_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.27.3&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Section&#8221; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/12\/nextron-threat-detection-references.jpg&#8221; parallax=&#8221;on&#8221; parallax_method=&#8221;off&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; header_font_size=&#8221;40px&#8221; custom_margin=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>These customers<br \/>already trust Nextron:<\/h1>\n<p>[\/et_pb_text][dsm_card_carousel slider_effect=&#8221;coverflow&#8221; slider_effect_coverflow_rotate=&#8221;50&#8243; centered_slides=&#8221;on&#8221; slide_to_show=&#8221;1&#8243; speed=&#8221;700&#8243; autoplay_speed=&#8221;14000&#8243; space_between=&#8221;30&#8243; equal_height=&#8221;on&#8221; layout=&#8221;inline&#8221; use_arrow_custom_position=&#8221;on&#8221; arrow_custom_position=&#8221;-20px&#8221; arrow_size=&#8221;20px&#8221; arrow_color=&#8221;#ffffff&#8221; arrow_background_color=&#8221;#009ec7&#8243; dots=&#8221;off&#8221; grab=&#8221;off&#8221; stretch_image=&#8221;off&#8221; slide_to_show_tablet=&#8221;3&#8243; slide_to_show_phone=&#8221;2&#8243; slide_to_show_last_edited=&#8221;off|desktop&#8221; slide_to_scroll_tablet=&#8221;3&#8243; slide_to_scroll_phone=&#8221;2&#8243; slide_to_scroll_last_edited=&#8221;off|desktop&#8221; slide_row_tablet=&#8221;1&#8243; slide_row_phone=&#8221;2&#8243; slide_row_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h3&#8243; header_font_size=&#8221;22px&#8221; background_enable_color=&#8221;off&#8221; max_width=&#8221;750px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;20px|30px|20px|30px|false|false&#8221; custom_css_free_form=&#8221;selector .swiper-button-prev,||selector .swiper-button-next {||  opacity: 0;||  transition: all .2s ease-in-out !important;||}||||selector:hover .swiper-button-prev,||selector:hover .swiper-button-next {||  opacity: 1;||}||||selector .dsm_card_carousel_arrow::before {||  font-size: 30px !important;||}&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][dsm_card_carousel_child image_as_background=&#8221;off&#8221; button_url_new_window=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; parent_button=&#8221;off&#8221; parent_header_level=&#8221;h3&#8243; parent_stretch_image=&#8221;off&#8221;]<img decoding=\"async\" style=\"max-height: 50px;\" src=\"\/wp-content\/uploads\/2023\/02\/swisscom-logo.png\" \/><\/p>\n<p><i>\u201cI have been given the opportunity to evaluate Nextron\u2019s VALHALLA feed. The handcrafted high quality detections with literally zero false-positive rate are an unmatched capability that does not only enable your detection technologies to stay ahead of the latest advanced threats but also is an extension of your own security team. Given the high quality and value the feed provides I can highly recommend VALHALLA.\u201d<\/i><\/p>\n<p><b>Markus Neis<\/b><br \/>\nSwisscom Schweiz AG[\/dsm_card_carousel_child][dsm_card_carousel_child image_as_background=&#8221;off&#8221; button_url_new_window=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; parent_button=&#8221;off&#8221; parent_header_level=&#8221;h3&#8243; parent_stretch_image=&#8221;off&#8221;]<img decoding=\"async\" style=\"max-height: 50px;\" src=\"\/wp-content\/uploads\/2023\/02\/infineon-logo.png\" \/><\/p>\n<p><i>\u201cIn our environment, we use Asgard for a multitude of use-cases. In addition to other security components, we use Asgard to regularly scan selected systems for sign of compromise. Furthermore, we use Asgard during incident response for both initial triage and comprehensive scanning of a system. The fact that the Asgard agent supports all major operating system platforms and versions in combination with its small resource footprint makes it the perfect solution in our case.\u201d<\/i><\/p>\n<p><b>Raphael Otto<\/b><br \/>\nHead of Cyber Defense Center, Infineon Technologies AG[\/dsm_card_carousel_child][\/dsm_card_carousel][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Section&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/12\/nextron-forensic_analysis-tools-blur.png&#8221; parallax=&#8221;on&#8221; parallax_method=&#8221;off&#8221; custom_margin=&#8221;||||false|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;60px||60px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; custom_css_main_element=&#8221;align-items: center;&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/AdobeStock_628857605_2-scaled.jpeg&#8221; title_text=&#8221;Cropped photo of businessman analyzing business diagram, marketi&#8221; disabled_on=&#8221;off|off|on&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;450px&#8221; max_width_tablet=&#8221;250px&#8221; max_width_phone=&#8221;250px&#8221; max_width_last_edited=&#8221;off|desktop&#8221; custom_css_free_form=&#8221;selector {||  background-color: #fff;||  padding: 2px;||  clip-path: polygon(0% 0%, 80% 0%, 100% 20%, 100% 100%, 20% 100%, 0% 80%);||}||||selector img {||  clip-path: polygon(0% 0%, 80% 0%, 100% 20%, 100% 100%, 20% 100%, 0% 80%);||}&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.3&#8243; _module_preset=&#8221;default&#8221; header_font_size=&#8221;40px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>About Nextron<\/h1>\n<p>Nextron Systems, a German technology company, is at the forefront of providing innovative security solutions for Compromise Assessments. With a client base exceeding 500 enterprise customers and risk-conscious mid-sized businesses from over 30 countries, our cutting-edge scanning solutions, THOR and ASGARD, are trusted and recommended by security agencies. Security professionals and forensic analysts appreciate our tools for safeguarding their data and systems amidst a rapidly evolving threat landscape.[\/et_pb_text][et_pb_button button_url=&#8221;\/about&#8221; button_text=&#8221;Learn More&#8221; _builder_version=&#8221;4.27.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/AdobeStock_628857605_2-scaled.jpeg&#8221; title_text=&#8221;Cropped photo of businessman analyzing business diagram, marketi&#8221; disabled_on=&#8221;on|on|off&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;450px&#8221; max_width_tablet=&#8221;250px&#8221; max_width_phone=&#8221;250px&#8221; max_width_last_edited=&#8221;off|desktop&#8221; module_alignment=&#8221;right&#8221; custom_css_free_form=&#8221;selector {||  background-color: #fff;||  padding: 2px;||  clip-path: polygon(0% 0%, 80% 0%, 100% 20%, 100% 100%, 20% 100%, 0% 80%);||}||||selector img {||  clip-path: polygon(0% 0%, 80% 0%, 100% 20%, 100% 100%, 20% 100%, 0% 80%);||}&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Section&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/12\/nextron-incidence-response-unlimited-possibilies-blur.png&#8221; parallax=&#8221;on&#8221; parallax_method=&#8221;off&#8221; custom_margin=&#8221;||||false|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;60px||60px||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; custom_css_main_element=&#8221;align-items: center;&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/03\/AdobeStock_593862240_4.jpeg.2024_03_06_17_22_25.0.png&#8221; title_text=&#8221;AdobeStock_593862240_4.jpeg.2024_03_06_17_22_25.0&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;450px&#8221; max_width_tablet=&#8221;250px&#8221; max_width_phone=&#8221;250px&#8221; max_width_last_edited=&#8221;off|desktop&#8221; custom_css_free_form=&#8221;selector {||  background-color: #fff;||  padding: 2px;||  clip-path: polygon(0% 0%, 80% 0%, 100% 20%, 100% 100%, 20% 100%, 0% 80%);||}||||selector img {||  clip-path: polygon(0% 0%, 80% 0%, 100% 20%, 100% 100%, 20% 100%, 0% 80%);||}&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.24.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.3&#8243; _module_preset=&#8221;default&#8221; header_font_size=&#8221;40px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Unlimited Possibilities<\/h1>\n<p>Our scanners and agents run on Microsoft Windows, Linux and macOS. However, the collectors for THOR Thunderstorm run on just any operating system. You can scan live systems, disk images or specific forensic evidence like EVTX files, memory dumps or Registry hives.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;\/products&#8221; button_text=&#8221;Our Products&#8221; _builder_version=&#8221;4.27.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Popup &#8211; #download-guide&#8221; module_id=&#8221;download-guide&#8221; module_class=&#8221;popup close-alt dark&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#15242a&#8221; da_is_popup=&#8221;on&#8221; da_popup_slug=&#8221;download-guide&#8221; da_dark_close=&#8221;on&#8221; da_alt_close=&#8221;on&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; header_font_size=&#8221;40px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Get your exclusive Best Practice Guide here:<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]                    <script type=\"text\/javascript\">\n                        var onloadSibCallback = function () {\n                            jQuery('.g-recaptcha').each(function (index, el) {\n                                grecaptcha.render(el, {\n                                    'sitekey': jQuery(el).attr('data-sitekey')\n                                });\n                            });\n                        };\n                    <\/script>\n\t\t\t\t\t                <script src=\"https:\/\/www.google.com\/recaptcha\/api.js?onload=onloadSibCallback&render=explicit\" async defer><\/script>\n\t\t\t\t\n\t\t\t<form id=\"sib_signup_form_8\" method=\"post\" class=\"sib_signup_form\">\n\t\t\t\t<div class=\"sib_loader\" style=\"display:none;\"><img\n\t\t\t\t\t\t\tsrc=\"https:\/\/www.nextron-systems.com\/wp-includes\/images\/spinner.gif\" alt=\"loader\"><\/div>\n\t\t\t\t<input type=\"hidden\" name=\"sib_form_action\" value=\"subscribe_form_submit\">\n\t\t\t\t<input type=\"hidden\" name=\"sib_form_id\" value=\"8\">\n                <input type=\"hidden\" name=\"sib_form_alert_notice\" value=\"Please fill out this field.\">\n                <input type=\"hidden\" name=\"sib_form_invalid_email_notice\" value=\"Your email address is invalid.\">\n                <input type=\"hidden\" name=\"sib_security\" value=\"f5cd8a9e17\">\n\t\t\t\t<div class=\"sib_signup_box_inside_8\">\n\t\t\t\t\t<div style=\"\/*display:none*\/\" class=\"sib_msg_disp\">\n\t\t\t\t\t<\/div>\n                    \t\t\t\t\t<p class=\"sib-VORNAME-area\">\r\n    <label class=\"sib-VORNAME-area\">First Name *<\/label>\r\n    <input type=\"text\" class=\"sib-VORNAME-area\" name=\"VORNAME\" required=\"required\">\r\n<\/p>\r\n<p class=\"sib-NACHNAME-area\">\r\n    <label class=\"sib-NACHNAME-area\">Last Name *<\/label>\r\n    <input type=\"text\" class=\"sib-NACHNAME-area\" name=\"NACHNAME\" required=\"required\">\r\n<\/p>\r\n<p class=\"sib-COMPANY-area\"> \r\n    <label class=\"sib-COMPANY-area\">Company *<\/label>\r\n    <input type=\"text\" class=\"sib-COMPANY-area\" name=\"COMPANY\" required=\"required\">\r\n<\/p>\r\n<p class=\"sib-email-area\">\r\n    <label class=\"sib-email-area\">Email Address *<\/label>\r\n    <input type=\"email\" class=\"sib-email-area\" name=\"email\" placeholder=\"\" value=\"\" required=\"required\">\r\n<\/p>\r\n<p style=\"padding: 0\" class=\"sib-multi-lists-area\">\r\n    <div class=\"sib-multi-lists\" data-require=\"\">\r\n        <div style=\"block\"><input type=\"checkbox\" class=\"sib-interesting-lists\" value=\"9\" name=\"listIDs[]\"> Subscribe to our newsletter for news, tips and insights.<\/div>\r\n    <\/div>\r\n<\/p>\r\n<p style=\"padding: 0 0 20px 0\" class=\"sib-OPT_IN-area\">\r\n    <input type=\"hidden\" name=\"OPT_IN\" value=\"0\"><input type=\"checkbox\" value=\"1\" class=\"sib-OPT_IN-area\" name=\"OPT_IN\" required=\"required\"> Accept our <a target=\"_blank\" href=\"\/privacy\">Privacy Policy<\/a>. *\r\n<\/p>\r\n<div id=\"sib_captcha\" class=\"g-recaptcha\" data-sitekey=\"6Le3sF4kAAAAAE-xabXy2qZANr3aHTUtImDKfGye\"><\/div>\r\n<p style=\"padding: 20px 0 0 0\">\r\n    <input type=\"submit\" class=\"sib-default-btn\" value=\"Submit\">\r\n<\/p>\t\t\t\t<\/div>\n\t\t\t<\/form>\n\t\t\t<style>\n\t\t\t\tform#sib_signup_form_8 p.sib-alert-message {\n    padding: 6px 12px;\n    margin-bottom: 20px;\n    border: 1px solid transparent;\n    border-radius: 4px;\n    -webkit-box-sizing: border-box;\n    -moz-box-sizing: border-box;\n    box-sizing: border-box;\n}\nform#sib_signup_form_8 p.sib-alert-message-error {\n    background-color: #f2dede;\n    border-color: #ebccd1;\n    color: #a94442;\n}\nform#sib_signup_form_8 p.sib-alert-message-success {\n    background-color: #dff0d8;\n    border-color: #d6e9c6;\n    color: #3c763d;\n}\nform#sib_signup_form_8 p.sib-alert-message-warning {\n    background-color: #fcf8e3;\n    border-color: #faebcc;\n    color: #8a6d3b;\n}\n\t\t\t<\/style>\n\t\t\t[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; custom_css_free_form=&#8221;selector ol {||\tlist-style-position: outside;||  padding-left: 30px;||}||||selector ol li {||  padding-bottom: 20px;||  margin-bottom: 20px;||  border-bottom: 2px solid #00161f;||}||||selector ol li:last-child {||  padding-bottom: 0;||  margin-bottom: 0;||  border-bottom: 0;||}||||selector ol li::marker {||\tfont-size: 20px;||  font-weight: bold;||\tcolor: #009ec7;||}&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ol>\n<li>Upon receiving an Opt-In email, you will have the opportunity to download our Best Practice Guide (as a PDF, 15 pages, 1,7 MB) without any obligation.<\/li>\n<li>The Best Practice Guide provides you with a comprehensive overview what steps to take to resolve the situation you are in!<\/li>\n<li>If you need immediate help we provide you with an emergency number at the end of the guide.<\/li>\n<li>The newsletter subscription is optional and you can unsubscribe at any time.<\/li>\n<\/ol>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you been attacked by a hacker?Time is critical. Our assessments deliver the insights you need to make informed decisions and limit damage.Uncover Hidden Threats, Minimize Damage. Even the most robust IT security measures can encounter sophisticated hacker activity. When a breach occurs, fast, detailed assessments are crucial to understanding the scope, minimizing damage, and implementing targeted countermeasures to prevent future incidents. Nextron\u2019s Continuous Compromise Assessment integrates seamlessly into your security operations, offering detailed insights into advanced hacking activity often missed by conventional tools.In our Best Practice Guide, you will discover: How to accelerate threat identification and enhance the depth of your analysis in just 6 steps using Nextron&#8217;s solutions. What enables Nextron to uncover hidden traces of hacker activity missed by conventional tools. How Nextron\u2019s global partner network provides immediate support in the event of a security incident. Interested in learning more? Download our Best Practice Guide for clear, actionable insights into how Nextron adds value to your cybersecurity operations.\u200bFirst Steps to Take After Identifying an IncidentGather as much information as possible on its nature, scope, and impact without making rushed decisions.Immediately isolate any compromised systems by disconnecting them from the network and disabling remote access. Avoid shutting down [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-19879","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Incident Response - Nextron Systems<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nextron-systems.com\/incident-response\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nextron-systems.com\/incident-response\/\",\"url\":\"https:\/\/www.nextron-systems.com\/incident-response\/\",\"name\":\"Incident Response - Nextron Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#website\"},\"datePublished\":\"2024-02-09T09:55:00+00:00\",\"dateModified\":\"2025-04-04T12:07:11+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nextron-systems.com\/incident-response\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nextron-systems.com\/#website\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"name\":\"Nextron Systems\",\"description\":\"We Detect Hackers\",\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nextron-systems.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\",\"name\":\"Nextron Systems GmbH\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"width\":260,\"height\":260,\"caption\":\"Nextron Systems GmbH\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Incident Response - Nextron Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nextron-systems.com\/incident-response\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.nextron-systems.com\/incident-response\/","url":"https:\/\/www.nextron-systems.com\/incident-response\/","name":"Incident Response - Nextron Systems","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/#website"},"datePublished":"2024-02-09T09:55:00+00:00","dateModified":"2025-04-04T12:07:11+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nextron-systems.com\/incident-response\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.nextron-systems.com\/#website","url":"https:\/\/www.nextron-systems.com\/","name":"Nextron Systems","description":"We Detect Hackers","publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nextron-systems.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nextron-systems.com\/#organization","name":"Nextron Systems GmbH","url":"https:\/\/www.nextron-systems.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","width":260,"height":260,"caption":"Nextron Systems GmbH"},"image":{"@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/pages\/19879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/comments?post=19879"}],"version-history":[{"count":81,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/pages\/19879\/revisions"}],"predecessor-version":[{"id":25189,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/pages\/19879\/revisions\/25189"}],"wp:attachment":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media?parent=19879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}