Incident Support

1. Incident & Breach Evaluation Hotline & Email

Incident & Breach Evaluation Hotline & Email is a special service only available to Ultimate Risk Services (URS) clients. The URS Incident & Breach Evaluation Hotline & email is provided by URS law partner Mullen Coughlin, who prides themselves on being the most responsive team around!

We are happy to provide, at no cost, an exclusive URS Incident & Breach Hotline and associated email address to be used by URS clients to access the Mullen Coughlin team and discuss a suspected privacy event. They promise to provide a return call to our client within 2 business hours, but their response time is normally a matter of minutes - including nights, holidays and weekends.

Instructions

After you dial the URS Incident & Breach Evaluation Hotline toll free number (844) 283-2881, you will hear…you have reached the law firm of Mullen Coughlin.

After the tone, please provide:

  • The full name of the organization;

  • The insurance carrier name and policy number, if available; and

  • The name and phone number of the individual authorized to discuss this matter.

Please state the contact phone number twice.

To protect the confidentiality of sensitive information, please do not leave any details other than the information requested.   Be advised that leaving a message on this line does not constitute notice of a claim to.  Mullen Coughlin will contact you within 2-4 business hours to discuss the details of this matter.  The initial discussion will be protected by the attorney-client privilege.

Thank you, and someone from Mullen Coughlin will be in touch with you shortly. 

2. Incident Activity & description

Response - Determine if the event is a real incident; implement your Incident Response Plan.

This is one of the most important aspects of handling any incident. The Incident Response Team must know if this is truly a computer security incident, as opposed to a user error or a system configuration error.

You may want to contact a third-party security expert from our resources list in this portal. Our Breach Coach® service may also be able to offer some guidance or suggestions.

Law Enforcement - if the event is real, consider contacting law enforcement.

Regional FBI Contact Map

Note: If management has decided that it wants to pursue and prosecute the network attacker, law enforcement must be notified as soon as it is verified that the incident is real. In most cases, law enforcement agencies will not step in and take over the incident. However, they will work with the team to ensure that its actions stay within the law and do not violate any individual rights. They will assist the team in properly documenting and storing evidence to protect the chain of custody that is necessary for evidence to be used in court. This step is especially important if the incident involves extortion.

Breach Laws - Contact Legal Counsel who specializes in data breaches. This is especially important if customer information was accessed and various state laws were triggered requiring a customer notification. Counsel can help in (a) interpreting the various state regulations; (b) your responsibilities under the law (if any) and (c) assisting in crafting the customer notice letter. 

Forensics - Following a network/data breach event, a company often chooses to engage third-party experts to assist with investigation and remediation, such as determining the facts around the data breach incident and understanding the extent of the event. Please see our listings of various third-party resources that offer Computer Forensics services.

Credit Monitoring - Many organizations that have suffered a data breach or leak incident offer customers credit monitoring services. You can find providers that offer these types of service in the Breach Services section 

• Insurance Claim - Notify your broker or your insurance company claims representative as soon as possible. You should be sure to have your IT company gather and document facts surrounding the incident. Network security event logs are often vital in helping verify the date, time and machine involved in an incident. Your company should save these logs.

Public Relations - You may need to engage a skilled public relations specialist to help communicate publicly about any breach and deal with the press. For assistance see public relations in the next section.

 

3. Incident Response Team

Breach Coach

Mullen Coughlin

John Mullen

610.608.8785

info@mullen.law

Forensics

The Crypsis Group

Brendan Rooney

703.541.9781

brendan.rooney@crypsisgroup.com

 

FireEye

FireEye Incident Response

1-855-692-2052

inbounds@mandiant.com

 

Kroll Advisory Solutions

Hillary Parkins

212.833.3268

hillary.parkins@kroll.com

 

Notification

Kroll Advisory Solutions

Hillary Parkins

212.833.3268

hillary.parkins@kroll.com

 

Experian Data Breach Resolution

Ozzie Fonseca

949.567.3851

ozzie.fonseca@experian.com

 

Public Relations

Infinite Global

Zach Olsen

415.732.7802

zach@infiniteglobal.com

 

Blue Moon Consulting Group

Simon Barker

415.316.0075

info@bluemoonconsultinggroup.com

 

Credit Monitoring

Experian Data Breach Resolution

Ozzie Fonseca

949.567.3851

ozzie.fonseca@experian.com

 

Kroll Advisory Solutions

Hillary Parkins

212.833.3268

hillary.parkins@kroll.com