When to Call the Experts: Recognising a Cyber Incident


Something’s wrong with your systems. You’re not sure what. It could be a technical glitch. It could be an attack.

How do you tell the difference? And when should you call in professional help?

Signs Something Might Be Wrong

User-reported issues:

  • Accounts locked for no apparent reason
  • Unusual password reset requests
  • Strange emails sent from internal accounts
  • Files missing or renamed
  • Unexpected software prompts or errors
  • Systems running slowly for no clear reason

Technical indicators:

  • Failed login attempts from unexpected locations
  • New user accounts you didn’t create
  • Disabled security tools
  • Unusual network traffic or bandwidth usage
  • Unexpected software installed
  • Changed system configurations

Business indicators:

  • Suppliers reporting strange requests
  • Clients asking about suspicious communications
  • Unexpected financial transactions
  • Missing or altered records

Any single indicator might have an innocent explanation. Multiple indicators, or severe single indicators, deserve investigation.

The Triage Process

When you notice something concerning:

Step 1: Don’t panic Rushed decisions during potential incidents often make things worse. Take a breath.

Step 2: Document what you’re seeing Write down:

  • What was observed
  • When (specific times)
  • Who noticed it
  • What systems are affected
  • Screenshots if possible

Step 3: Initial assessment Quick questions to answer:

  • Could this be user error or a technical problem?
  • Are multiple people or systems affected?
  • Is there any obvious malicious activity (ransom notes, defacement)?
  • Is sensitive data potentially at risk?

Step 4: Contain if obvious If something is clearly wrong:

  • Disconnect affected systems from the network (don’t power off)
  • Don’t use affected systems to communicate about the incident
  • Preserve logs and evidence

Step 5: Escalate appropriately Based on severity and your capabilities.

When to Call Your IT Provider

If you have IT support (internal or external), contact them when:

  • You’ve noticed concerning indicators but aren’t sure what they mean
  • You need help investigating
  • You want to implement containment measures
  • You’re not sure whether this is a real incident

Most IT providers can do initial triage and determine whether escalation is needed.

When to Call Incident Response Specialists

Professional incident response (beyond regular IT support) when:

Confirmed compromise:

  • You’ve found evidence of actual attacker activity
  • Ransomware has deployed
  • Data has been stolen
  • Business email compromise has succeeded

Significant potential:

  • Multiple indicators suggest coordinated attack
  • Critical systems might be affected
  • Sensitive customer data might be exposed
  • Regulatory notification might be required

Uncertainty with high stakes:

  • You’re not sure what’s happening, but impact could be severe
  • Attacker might still be present
  • You need forensic evidence preserved

Insurance or regulatory requirements:

  • Your cyber insurance requires approved incident response
  • You need to demonstrate proper response for compliance

Incident response specialists cost money ($300-500/hour is typical) but they bring expertise you don’t have. For significant incidents, they’re worth it.

When to Contact Your Cyber Insurance

Immediately if:

  • You’re confident this is a real incident
  • There’s potential for significant loss
  • You might need incident response services
  • You think you might make a claim

Why early:

  • Many policies require prompt notification
  • Insurance often provides access to incident response resources
  • They can advise on response and coverage
  • Late notification might affect claims

Keep your policy number and claims contact accessible for exactly this situation.

When to Report to ACSC/Police

Report to ACSC via ReportCyber (cyber.gov.au/report) if:

  • You’ve experienced a cyber incident
  • Even if you’ve handled it yourself
  • Even if you’re not sure of the full scope

This isn’t primarily about getting help (though they may provide guidance) - it’s about contributing to national cyber intelligence that helps protect other businesses.

Report to police (ACORN) if:

  • Financial loss has occurred
  • Personal data has been stolen
  • You want formal investigation
  • Insurance or legal matters require it

What Incident Responders Will Do

If you engage professional incident response:

Triage and containment:

  • Assess the scope of the incident
  • Stop ongoing damage
  • Preserve evidence

Investigation:

  • Determine how attackers got in
  • Identify what was accessed or stolen
  • Find any persistence mechanisms
  • Map the full extent of compromise

Eradication:

  • Remove attacker access
  • Patch vulnerabilities that were exploited
  • Rebuild compromised systems

Recovery:

  • Restore systems to operation
  • Verify security of restored environment
  • Return to normal operations

Reporting:

  • Document what happened
  • Provide evidence for insurance/legal
  • Deliver recommendations for prevention

Common Incident Response Mistakes

Powering off systems: This destroys volatile evidence. Disconnect from network instead.

Investigating on compromised systems: Attackers might be watching. Use separate clean systems.

Contacting attackers yourself: If negotiation is needed, let professionals handle it.

Rushing to “fix” things: Cleaning up before understanding the problem can destroy evidence and miss persistence.

Not preserving logs: Evidence can be overwritten. Export and preserve logs early.

Communicating on compromised channels: If email is compromised, don’t discuss the incident via email.

Building Response Capability

Before an incident happens:

Have contacts ready:

  • IT support emergency line
  • Cyber insurance claims contact
  • Incident response firm (your insurance might mandate one)
  • ACSC ReportCyber URL

Know your systems:

  • What’s critical
  • Where data lives
  • How to isolate systems
  • Who has admin access

Document your environment:

  • Network diagrams
  • System inventories
  • Critical process documentation
  • Backup locations and access

Test your response:

  • Tabletop exercises
  • Know who makes what decisions
  • Practice communication chains

The Decision Framework

Simple framework for incident decisions:

Level 1: Monitor and investigate

  • Single suspicious indicator
  • No confirmed compromise
  • Normal IT support can investigate

Level 2: Contain and assess

  • Multiple indicators or single severe indicator
  • Possible but unconfirmed compromise
  • IT support with potential escalation

Level 3: Full incident response

  • Confirmed compromise
  • Data potentially affected
  • Regulatory implications
  • Insurance claim likely
  • Call the specialists

When in doubt, escalate. The cost of overreacting is much less than the cost of underreacting.

Final Thought

Recognising and responding to incidents is a skill. The more you think about it before an incident, the better you’ll handle one when it happens.

You don’t need to be an expert. You need to be prepared enough to recognise when experts are needed, and have the contacts to reach them quickly.

That preparation could be the difference between a contained incident and a business-ending breach.