Use your computer fearlessly.




Mission Services Articles Research






Out-Sourcing Cybersecurity

by Brent Kirkpatrick

(Date Published: .)



Essential aspects of cybersecurity must be done in-house.



Incident response cannot be out-sourced, it must be done in-house. While leadership can bring in an outside team to lead the incident response, on-site people do the bulk of the work. Occasionally computers can be sent away for detailed digital forensics, but cyberdefense must be done with physical access to the computers and network that are under cyberattack.

Your network cannot be shipped in its entirety to a forensics lab. So most of your response to cyberattack is on-site incident response---the somewhat cursory and limited investigation required to clean the hackers off your network. Sometimes the intrusion response team sends a computer or router away for detailed forensics analysis. Digital forensics of a small number of computers is the only part that can be successfully outsourced.

Incident response must be done in cooperation with local IT people. Successful defense against cyberattack requires detailed knowledge your network infrastructure and computer system configuration. Local IT teams need to cultivate cybersecurity skills and be prepared to respond to intrusions.

Intrepid Net Computing's defendIT package provides IT people with the tools they need to implement incident response with support from our cybersecurity researchers.


defendIT image

defendIT. AI-driven security measures derived from security incident data.


Business Articles

What is Cybersecurity Incident Response?
Why Clean-Up Hacking?
Cascading Data Breaches
Rapid Containment of Intrusions

Price Gouging Hacking Victims







INC Logo




What Is New? | Contact | Tips


© 2015, 2016, 2017, 2018 Intrepid Net Computing. All rights reserved.