Incident Response

Are you prepared to deal with the aftermath of a cyber-attack? Incident response is an essential process for every business that helps to contain and stop an attack, getting you back on your feet as quickly as possible.

Complete our free Security Self-Assessment


1. Cyber Fundamentals: Identify & Assess your Risks

This is the first in a series of posts that will aim to provide some initial guidance on the fundamentals of cyber security.

Here we start with what we feel is the most overlooked aspect of any security activity, especially in smaller organisations; Identifying and Assessing the Risks.

2. Cyber Fundamentals: Email Anti-spoofing

Email anti-spoofing is an often unknown or misunderstood security control, that aims to reduce the chance of receiving emails impersonating (spoofing) a legitimate individual or company.

3. Cyber Fundamentals: Email Security

Email has been the biggest vector used in cyber-attacks for many years, with over 95% of attacks delivered using email. Which is why continuing with the basic security measures provided by email clients and services, is not enough to prevent today's modern emails attacks.

How would you respond to a Cyber Attack?

Many businesses are simply not prepared to deal with a cyber security event or breach scenario, so having a partner you can turn to when the bad times start is key.

Average time to detect a breach is still over 100 days, and recovering from an attack can be much longer. The hard sad facts are that some businesses fail to get back up and running.

Don’t be one of these organisations.

Having strong cyber defences is the core goal to start with, but no one can be 100% secure.

When things go bad every second counts - you need to be prepared to respond, both quickly and effectively. This is where Ironshare can help.

Duo Security

Benefits & Features

Planning & Preparation

Assist with Incident Response Planning, whether that be reviewing your existing processes or starting from scratch to create an IR plan. Helping you to be more prepared when the time comes to act.

Respond, Contain & Recover

Engage, assess the issue, investigate, contain the threat, remediate any problems, help recover damaged services, & identify the root cause. With all findings and actions captured and a report generated.

Get Back to Business Quicker

No one wants their business to be down, for days, weeks or even months. Getting your business fully operational quickly and safely, after an incident is the goal.

Incident Response Retainer

Ironshare provide a retainer service that can be called on quickly when you need help the most.

AV-TEST places Cisco Umbrella as the leading Secure Web Gateway

AV-TEST a leading independent research institute for IT security  performed a review of Cisco Umbrella alongside comparable offerings from Akamai, Infoblox, Palo Alto Networks, Symantec and Zscaler.

Testing was broken into two phases, first DNS-Layer Security and second Secure Web Gateway. In both tests Cisco Umbrella outperformed all other vendor offerings, coming out on top.

Cisco Services

Cisco Umbrella

Access to an advanced threat protection platform, that secures you from the minute its enabled, protecting against Malware, Phishing and Command & Control (C2) threats on the Internet.

Cisco Secure Endpoint

Cloud based security platform protects your devices from the minute its enabled, detecting advanced malware through continuous file analysis and monitoring.

Free Trials

There is no hardware to install and a simple change to your DNS settings or installing the Secure Endpoint lightweight client on your endpoints can get you up and running in minutes.

If you like what Cisco Umbrella and Secure Endpoint has to offer then why not try it out with a no-obligation to buy, Free Trial.

No items found.

Complete Data Backup Protection for your Office 365 productivity suite

Duo Pricing

£3 user/month

Full-featured two-factor authentication & secure access, for every organisation.


Multi-Factor Authentication

Single Sign-On

Protect Any Application

Protect Federated Cloud Apps


£6 user/month

Essential access-security suite to address risks from cloud, BYOD, and mobile.

Duo Access

Adaptive Groups Based Policy Controls

Unified Device Visibility

User Based Policy

Device Based Policy

Duo Device Health Application


£9 user/month

Easiest and most complete platform to address BYOD and cloud security risks.

Duo Beyond

Trusted Endpoints

Secure Remote Access into Internal Applications

Duo Mobile as Trusted


What is Multi-Factor Authentication?

Multi-factor authentication protects your applications by using a second source of validation, like a phone or token, to verify user identity before granting access. Implementing multi-factor authentication doesn't have to be disruptive to your users.

With its self-enrolment feature, Duo is fast and easy to use; it offers several available authentication methods so that you can choose the one that best suits your workflow. Duo also comes with an intuitive administrative dashboard, detailed reporting, and an always-up-to-date cloud-based model, multi-factor authentication couldn't be easier to manage.


Free Downloads

No items found.

Speak to an advisor about

Incident Response

For more information on our services please get in touch.

Contact US

Ironshare is a provider of Information and Cyber Security services.

we went with; wizard pi