The Incident Response module plays a critical role in protecting and strengthening your organization’s cyber security posture. This module is designed to detect potential cyber threats early, analyze the origin of these threats in detail and provide fast and effective solutions against security vulnerabilities.

Incident Response process proceeds as follows:

  • Reporting: When receiving suspicious emails, employees report these emails with a single click using the E-PAS plugin.

  • Analysis and Evaluation: Our security team meticulously examines the reported content and conducts a comprehensive security analysis on the identity of the sender, the content of the email, associated links and attachments. A security score is determined as a result of this analysis.

  • Quick Response: When a dangerous e-mail is detected, our system automatically takes action and quickly removes the relevant e-mail from the mailboxes of all company employees.

How Incident Notification Works?

This mechanism acts as an early warning against threats with a user-friendly interface and automated notification system. Below, the functioning and logic of this mechanism is detailed:

1. User Interaction:

👉 When employees encounter a suspicious email, they have a tool to report it via the integrated E-PAS plugin. The plugin is integrated into the user interface as a simple Report button and is easy to use.

2. Notification Activation:

👉 Clicking on the Report button triggers a series of processes in the background. The email is automatically classified according to predefined security parameters and forwarded to the security team.

3. Information Collection:

👉 As soon as the notification is made, the system collects the metadata (timestamp, sender’s address, subject line, etc.) of the relevant email. In addition, the content of the email, links and attachments are also sent to our team for analysis.

4. Communication and Follow-up:

👉 A confirmation message is shown to the user that the notification has been successfully transmitted. The security team initiates the incident response process and informs the user about the situation when necessary.

5. Data Logging and Analytics:

👉 Each notification is logged for use in future threat analysis and development of security training materials.

❓E-PAS Plugin

  • E-PAS add-in is a security tool designed for use in Outlook. With this add-in it is possible to quickly detect and report suspicious emails.

  • If users find any e-mail suspicious, they can report it directly to our security team by clicking on the E-PAS button in Outlook.