Blog
WebsiteLoginFree Trial
  • 🏠PagerTree Blog
  • 📣AT&T Email to Text Ends June 17, 2025: Switch to PagerTree Notifications
  • 📣Meet the PagerTree CLI: Your New On-Call Sidekick!
  • 📣OpsGenie Shutdown Announced: Why PagerTree Is Your Best Alternative in 2025
  • 💎Getting Started With Ruby on Rails in 2024 - The Complete Development Environment Guide
  • 📣WhatsApp Notifications
  • 🧠Site Reliability Engineer (SRE) Interview Questions
  • 👑What is System Monitoring?
  • 👑Top 5 Best PagerDuty Alternatives in 2024
  • 🔡Understanding Linux File System: A Comprehensive Guide to Common Directories
  • 🔡Ping Command: A Comprehensive Guide to Network Connectivity Tests
  • 📜Fly.io migrate-to-v2 Postgres stuck in read-only mode
  • 💎Multi-Tenant SSO using Devise
  • ✨PromQL Cheat Sheet: A Quick Guide to Prometheus Query Language
  • 🔡PowerShell Cheat Sheet: Essential Commands for Efficient Scripting
  • 📣Critical Alerts for iOS and iPhone
  • 📣PagerTree 4.0 is finally here!
  • 💎Ruby on Rails Polymorphic Select Dropdown
  • 🧠SRE Metrics: Availability
  • 🚨Incident Response Alert Routing
  • 💎Ruby on Rails Development Setup for Beginners
  • ✨Jekyll site to AWS S3 using GitHub Actions
  • 💎Migrate attr_encrypted to Rails 7 Active Record encrypts
  • 💎Ruby on Rails Cheat Sheet
  • 📣PagerTree Forms Integration
  • 📣Public Team Calendars
  • 📣Slack, Mattermost, Microsoft Teams, and Google Chat
  • 📣On-call Schedule Rotations
  • 📣Maintenance Windows
  • ✨Docker Commands Cheat Sheet
  • 🪄Slack Channel Stakeholder Notifications
  • 📣PagerTree Live Call Routing
  • 🧠The Science of On-Call
  • ✨serverless
    • 🧠What is Serverless?
    • 🧠Serverless Scales
    • 🧠Serverless Costs
    • ✨Serverless Tools and Best Practices
  • ✨Prometheus Monitoring Tutorial
Powered by GitBook
On this page
  • Data Breach
  • Incident Response Planning
  • Communication Process
  • Alert Routing Process

Was this helpful?

Incident Response Alert Routing

You have identified a data breach, now what? In this blog post I’ll teach you how to streamline your incident response during a data breach with best practices.

PreviousSRE Metrics: AvailabilityNextRuby on Rails Development Setup for Beginners

Last updated 9 months ago

Was this helpful?

Data Breach

You have identified a data breach, now what?

Your Playbook is up to date. You have drilled for this, you know who the key players on your team are and you have their home phone numbers, mobile phone numbers, and email addresses, so you get to work. It is seven o’clock in the evening so you are sure everyone is available and ready to respond, you begin typing “that” email and making phone calls, one at a time.

Incident Response Planning

There are a number of things wrong with this scenario:

  • How often do you drill and practice incident response?

  • Are we lucky enough for these incidents to happen at a decent time of the day?

  • How long does it take to write “that” email?

  • How long does it take to contact every person on your list?

The average cost of a data breach in 2020 was $3.86 million, according to a new . –

Regardless of where you identify a data breach on the frameworks, internal notification and incident response are crucial, as every second counts.

Communication Process

Manual processes can be the single point of failure in our ever-evolving automated world. Passive communication channels, like email, leave the sender wondering if the recipient has received and read said email. This assumes that a person is sending an email alert. Today many security appliances and platforms are configured to send emails to static email addresses. In most instances, these appliances and platforms are outbound only with no way of confirming delivery or read receipts.

The proliferation of instant messaging applications allows us to look at our screen and see those three dots scrolling which in turn tells our brain the message has been delivered, read, and is being responded to, in real-time. It is this type of technology that continues to transform the digital workplace forcing companies to find solutions that allow us to “work as we live”.

Alert Routing Process

Spending on cybersecurity prevention, detection, and incident response has increased exponentially over the last decade, and that trend continues. As good as many of these products are, the number one notification channel continues to be electronic mail. E-mail is a passive way of communication, with the sender often having no idea if the email was received, let alone read. Forget about people changing email addresses or leaving organizations, once an email address has been entered into an appliance or platform it is often forgotten. If your sentry sends up a signal and nobody sees it, then your incident response will be delayed or worse.

Regardless of your chosen alert routing platform, you should be looking for some of the following characteristics:

  • Configuration options that give you the ability to customize how you reach your team: Voice Call, SMS, Push Notification, Instant Messaging, Email

  • Easy to use scheduling calendars for one or many team/members

  • Configure how often a communication channel is repeated

  • Configure how long to try reaching a team member before moving on to the next person on the schedule

  • Utilize escalation layers in the event a team member is unavailable

  • Alerts initiated via email, webhooks, or other custom integrations

  • Redundant telecommunication channels

  • Key Performance Indicators (KPI) like Meantime to Respond

  • API and other integration opportunities

Ultimately, your alert routing platform should provide you with the confidence to move on to the next steps in your incident response playbook and not focus on who has and has not been alerted. This will allow you to focus your team’s efforts on mitigating the data breach or cybersecurity event, mere seconds after the notification process is initiated, saving you time, frustration, and money.

Justine Phillips is a partner with specializing in Privacy and Cybersecurity and a thought leader in Data Breach response, offered some insight into some of the challenges organizations face when responding to data breaches, and other cybersecurity events.

Automation and real-time alert routing saves valuable time to contain and remediate a cyber event. It also gets the right people engaged at the right time to begin the forensic investigation. Many laws impose time-sensitive deadlines and the clock starts running when the event is discovered. –

To bridge this gap, we should look at automation and alert routing platforms. An alert routing platform should have the ability to tie in your along with your preferred channel of communication: Voice, SMS, Push, Instant Messaging, and yes, even email. For instance, PagerTree allows you to take a single email address and transform it from a serial communication channel into a powerful multi-channel mechanism that triggers multiple communications to multiple people across many channels. In addition to multi-channel communications, PagerTree requires users to actively accept or reject a notification. This allows incident commanders to know, in real-time, who has acknowledged or rejected a given alert notification.

If you are still searching for an intelligent, alert routing platform, check out PagerTree.If you are still searching for an intelligent, alert routing platform, check out PagerTree. that could help your organization if it faces a data breach.

🚨
Incident Response
report from IBM and the Ponemon Institute
Dan Swinhoe, CSO Online
Cyber Kill Chain or MITRE ATT&CK
Sheppard Mullin
Justine Phillips
monitoring systems
Click here to start a fully functional risk-free trial
Old School Meme
Incident Response Flow