How to react in the event of a cyber-attack against my company?

Call on Ziwit Incident Response Team
Incident Response Team

Incident Response Team

Intrusion, data theft, ransomwares and many others... Unsolved, these attacks can have major consequences on your company. Our team of consultant experts is ready to help you immediately and will ensure that the incident becomes a thing of the past.

How to respond against a hacker attack? Basic steps to do

Is your company a victim of malicious activities? Don't let the hacker get in the way and stay calm. While waiting to be dealt with by the Ziwit Incident Response Team, don’t fall into some easy traps! Regardless of the attack you are victim of, the law provides legislative sanctions. In order for a cyber attack to be admissible in court, it is essential to provide as many evidence as possible. To collect this evidence, there are some practices to avoid

To discover all the traps and learn more about the good practices to adopt in case of a security incident, you can download our free Ziwit Do’s and Don’ts Guideline.

Do not shut down your server! 


While it may be tempting to turn off your website server, it will automatically delete its memory. Then, no forensic analysis can be carried out by our intervention team, and crucial evidence will be definitively lost. To avoid this, make a copy of your data on an external hard drive.

Do not reset your computer system!

Your backup might potentially be infected.


Some threats are very persistent and on average, it takes about 90 days for a company to become aware of an incident. The system may have been infected a while ago, and this risk might be applied directly to the backups. Installing a contaminated backup is very dangerous because another infection can happen again.

What kinds of incidents could be solved?

A single weakness is enough to damage your system and exploit its vulnerability. Therefore, you must be able to react to any kind of attack. This is where Ziwit comes in.

While it is not always possible to stop a malicious act before it reaches your security zone, our experts are able to control the damages and work on all types of security incidents such as :




Phishing and
Spear phishing


Pirated software
and websites








Zero Day


Data and
passwords flaws

Incident Response Intervention

What are the main steps of the Incident Response Intervention?

From threat detection to recovery, the Ziwit Incident Response Team is on your side throughout the process in order to insure maximum and long-lasting security. Flexible and responsive, our team can operate on your premises or remotely, depending on your needs. The intervention is conducted in three main steps:

Contact us

While it may be tempting to turn off your website server, it will automatically delete its memory. Then, no forensic analysis can be carried out by our intervention team, and crucial evidence will be definitively lost. To avoid this, make a copy of your data on an external hard drive.

The malicious software is deleted, signatures are updated, and security breaches are fixed. The incident tracking and artefacts left by the hacker will be removed. Corrective measures will be applied to prevent the incident from happening again. The eradication protocol methodically carried out quickly and synchronously to ensure that the pirate does not continue the malicious action.

The aim of this last stage is to go back to a normal operating state and enable the company to continue its regular business activities.

Ask for help?

Need for intervention

Our certifications

The PASSI qualification is a security VISA issued by the ANSSI (National Agency for the Security of Information Systems). This certificate issued by ANSSI bears witness to our skills and expertise as auditors, but also to the attention we pay to protecting the integrity of the confidential information to which we may have access during our services to our customers.


Ziwit holds the label ExpertCyber

Ziwit expert in digital security, guarantees technical expertise as well as quality advice to prevent acts of cyber-surveillance and secure your IT installations and your websites.

As an ExpertCyber certified service provider, Ziwit is committed to respecting its charter of commitments.


Ziwit holds the label France Cybersecurity

The France Cybersecurity label offers the guarantee that the labeled products, solutions and services are designed, developed and operated in France, by a dynamic and innovative industrial sector recognized by the market. It is therefore a mark of excellence for companies.


Ziwit holds the label QUALIOPI

QUALIOPI is the unique quality certification mark for training organizations. It has been mandatory since January 1, 2022. ZIWIT fully complies with the 32 new indicators in the national quality reference framework, organized around 7 quality criteria. Our training courses can therefore be referenced by accredited organizations and are eligible for funding.


Ziwit is part of the national system Cyber Malicious

Ziwit's mission is to support victims of cyberattacks through its cybersecurity solutions and tools .

As a service provider listed on the french government platform Cyber Malicious, Ziwit is committed to respecting its charter of commitments.


Our C)PTE certified cybersecurity experts

(CERTIFIED Penetration Testing Engineer)

Developed on the basis of the US Force One methodology, and accredited by both the NSA and the FBI, this certification allows us to explore all the existing technical and non-technical means of accessing an information system in an illicit way.
Our pentesters are trained in the art of ethical hacking and the latest techniques in penetration testing, with the aim of recognizing each key element: Information gathering, scanning, enumeration, exploitation and reporting.


Our CEH certified cybersecurity experts

(Certified Ethical Hacker)

Our pentesters are experienced in vulnerability research. They have the internationally recognized CEH certification to guarantee you a qualified and ethical technical auditor.


Ziwit is certified OSCP

(Offensive Security Certified Professional)

OSCP is an ethical hacking certification offered by Offensive Security (or OffSec) that teaches penetration testing methodologies and the use of the tools included with the Kali Linux distribution.

The OSCP is a hands-on penetration testing certification, requiring holders to successfully attack and penetrate various live machines in a safe lab environment.


Ziwit holds the label PNPT

(Practical Network Penetration Tester)

Delivered by TCM Security, the PNPT certification is a unique ethical hacking exam that evaluates a pentester's ability to perform a professional level network penetration test and its potential to perform open source research (OSINT) to gather information on how to properly attack that network.
Our pentesters know how to make the most of their Active Directory exploitation skills to perform A/V and egress bypasses, lateral and vertical network movements, and ultimately compromise the domain controller under investigation.


Ziwit holds the Cyber Essentials certification

Cyber Essentials is a certification supported by the British government (United Kingdom) to help organizations ensure operational security against cyber attacks.


Ziwit holds the IASME GDPR certification

Issued by the IASME consortium and supported by the UK Government, "IASME GDPR" reinforces Cyber Essential by validating Ziwit's GDPR skills, and its ability to comply with its requirements.
IASME GDPR certification is proof that ZIWIT has taken enhanced measures to protect your business and your data from cyber-attacks on the Internet.


Ziwit holds the Cybersecurity Made In Europe certification

The "Cybersecurity made in Europe" certification is designed to promote European cybersecurity companies and increase their visibility on the European and global market. The certification raises awareness of the strategic value of cybersecurity companies originating in Europe and developing their activity on the basis of European values of trust.


Ziwit is a member ACN

(Alliance for digital trust)

ACN is a group of companies that award services, solutions and technologies that limit risk and therefore increase trust.


Ziwit is an associated member Campus Cyber

It will be a French hub of cybersecurity by 2022 that will bring together the main national and international players in the field.

Our certifications

ExpertCyber (Digital Security Label)
ExpertCyber (Digital Security Label)
France Cybersecurity
C)PTE (CERTIFIED Penetration Testing Engineer)
Cyber Malicious
C)PTE (CERTIFIED Penetration Testing Engineer)
Certified Ethical Hacker
Certified Ethical Hacker
Certified Ethical Hacker
Cyber Essentials
Cybersecurity Made In Europe
Alliance for digital trust
Campus Cyber
Responsive and available, our experts team works in an emergency context to restore the security of your company

Responsive and available, our experts team works in an emergency context to restore the security of your company. Its in-depth know-how in safety and engineering techniques lets us to deal with your request as promptly as possible.

Web Security
Application security
System Security
IT Security
GDPR Audits
Penetration testing
Reverse Engineering
Cryptography and Authentication
Social Engineering

Need a fast intervention?

Why do I need to react quickly to pirate attacks?

Today, it is not unusual for a company to be the target of a cyber-attack. No one is beyond protection, and a single weakness enables a malicious person to harm your business. To deal with a crisis, it is important to set up a defensive strategy in order to restore the organization's security as soon as possible. Calling a cyber security company is a safe and effective way to eradicate cyber-attacks. When handled on time, the risks and damages will have a reduced impact on your company.

Fake websites, malicious software, spy work, ransomware or even phishing... there are lots of different cyber risks. Our team of IT security experts has the skills, protocols and responsiveness to be quickly effective and neutralize all types of incidents. The purpose is to immediately stop the attack while fixing any damage it may have caused.

Pirate attacks

Download the guideline on the Do’s and Don'ts in case of a cyber-attack

DO'S and DON'T practical guidebook in case of cyber attacks

How to protect my company from cyber risks in the future?

According to a study conducted by OpinionWay for CESIN in January 2019, eight companies out of ten reported being the victim of a cyber-attack. Why be part of them when you can effectively be secured against cyber threats all year round?

HTTPCS offers you a complete coverage against risks to ensure the durability of your company.

Don’t let your company under cyber threats anymore, contact the HTTPCS experts today.

Your satisfaction and security are our priorities. Contact us

Contact us!

+33 1 85 09 15 09