iON Security Assessments: Strengthening Your Cyber Defenses
Uncover Hidden Security Gaps and Build a Resilient Future In today’s digital-first world, organizations face increasing threats from cybercriminals....
In 2023, the Akira group forced KNP, a 158-year-old British transport company, to close their doors for good. The group breached KNP's defences and used ransomware to encrypt the company's entire digital footprint, then destroyed its backups and disaster recovery systems.
Without any data left to continue, KNP went out of business.
The attack came as part of a wave of incidents that saw cybercrime increase 58%, from 818 per organization in the second quarter of 2021 to 1,984 in the same period in 2025, according to the World Economic Forum. This drastic rise in cyberattacks, paired with ever-increasing sophistication, has forced companies to face a new reality in cybersecurity: stopping all attacks is not a realistic standard for success.
Instead, organizations must employ an "assume breach" mentality and build a response plan that will guide their team as they protect their organization's interests during the inevitable attack.
That requires a comprehensive incident response plan that documents items such as:
As an offensive security practitioner, it's my job to anticipate how attackers will penetrate a company's defences and test defences before the worst happens. In companies that are cyber resilient, that means I may get detected immediately, even if I only run an innocuous command.
For those who aren't ready, I can go much further.
If that happens, we start talking about their incident response plan.

Preparation, in the form of an incident response plan, is the difference between an immediate reaction that limits damage and indecision that gives attackers time to operate freely.
To be effective, an incident response plan should cover four main phases:
*It is important to note here that although these are considered discrete steps, they don't necessarily happen in order. When responding to a breach, an organization will move forward and backward along the incident response plan as things develop and new information comes to light.
But long before that happens, you need to get everybody in one room to ask the right questions in preparation.
Preparing an effective response plan starts with asking the right questions, both about your organization and how an attack may play out. The answers to these questions lay the foundation for your response plan.
But preparation isn't done once you've documented your plan.
Taking the time to test the plan is essential. This allows you to find holes or potential failure points in your cyber resilience strategies so you can increase the efficacy of your plan before it's tested by malicious actors under more stressful conditions.
While it's possible to prepare your plan without help from outside organizations, including a third-party (like iON) that has experience dealing with breaches in real-time, will give you valuable insight into how breaches usually play out and how even the best plans can fall apart.
Questions to ask
Detecting an incident sets off the response plan.
Ideally, you'll have someone monitoring your system continuously as part of your cyber security framework, so as soon as a breach is detected, it can be validated, and your response can begin. If you don't have the budget to have a 24/7 team in-house, you can get managed detection from a third party like iON.
Questions to ask
The main goal of this step is to mitigate and limit the activities of the attacker in your network.
That requires finding out:
Then, once that's better understood, your team will take the needed actions to stop their progress. That could mean taking a system offline, a user offline, or disconnecting from the internet entirely.
Questions to ask
As you contain the attacker, the goal turns to mitigating any damage done and eradicating any malware that may have been installed. Depending on your organization, that may look like cleaning systems, restoring from backups, or completely rebuilding an ecosystem.
To properly plan for this step, you'll want to develop a comprehensive business continuity and disaster recovery (BC/DR) plan that defines how critical systems will be failed-over or restored during major disruptions.
Questions to ask
After the incident has been dealt with, you'll move into the recovery phase of the incident response plan. During this phase, the focus is to resume normal operations.
Beyond the technical aspect, recovery also involves communicating with your clients to let them know what happened and how you are increasing your security going forward. (While we're including communication as a part of recovery, it is important to communicate with all stakeholders throughout the breach.)
For most breaches, this step dictates how both regulators and the public react to the incident. Organizations that clearly communicate what happened and their next steps face lower fines and less impact on their brand.
Questions to ask
When documenting your recovery plan
After an incident
In incident response, no plan is ever finished.
After recovery, there are post-recovery steps to go through. When there are significant changes in your organization, the plan should be revisited to make sure it still applies. And, even if your organization stays the same, attackers are always developing new methods, so you'll need to revisit your plan regularly to ensure it makes sense as the world of cybersecurity changes.
These continuous changes should be addressed through:
Fast recovery requires constant vigilance. From reworking response plans to detecting breaches as soon as possible, readiness is the difference between limiting damage and losing data.
But not every organization has the budget or bandwidth to stay constantly vigilant.
At iON, we work with companies to expand their ability to stay engaged and aware of everything happening in the networks.
We offer:
This allows you to leverage our 24-hour team to take care of those early stages of incident response. So, if you face an incident at two in the morning on a Sunday when your team is sleeping, you still have someone there to detect it and start the incident response process.
That means, you may get woken up in the middle of the night with bad news, instead of being contacted in the early morning with disastrous news. But, it also may mean we contact you on Monday at 8:30, telling you we took care of an incident for you.
Tyson Rauch is the Principal Consultant, Offensive Security in Services at iON, with over 20 years of IT experience, including 17 focused on cybersecurity. He has extensive expertise in penetration testing, red and purple team engagements, social engineering, incident response, and security program development. Previously a virtual CISO, Tyson has led security maturity assessments, vendor risk programs, and incident response planning. At iON, he conducts offensive security assessments, mentors the penetration testing team, and enhances testing methodologies. He holds CISSP and CSSP certifications and has worked across industries, including retail, finance, industrial, and law enforcement.
Uncover Hidden Security Gaps and Build a Resilient Future In today’s digital-first world, organizations face increasing threats from cybercriminals....
Learn why most cybersecurity awareness programs fail — and how building a human-first, cyber-aware culture can transform your security from the...
October is Cybersecurity Awareness Month: Protecting Your Business in a Digital World As technology continues to drive business innovation, cyber...