Incident Response for Long Island & NYC Businesses
Active ransomware, data breach, or business-stopping outage? PTG's certified incident response team contains the threat and gets you operational — 24/7/365 from our Long Island and NYC base. A responder picks up within 15 minutes.
Under attack right now? Here's what to do
If you're reading this during an active incident, follow these steps before calling. Every minute matters, but the wrong move makes things worse.
Every minute matters, but the wrong move makes things worse. Follow these steps before calling.
Disconnect, don't power off
Pull the network cable or disable Wi-Fi on affected systems. Powering off destroys forensic evidence in memory that helps identify the threat actor and sometimes recover encryption keys.
Don't talk to the attacker
No replies to ransom notes, no visits to the payment portal, no acknowledgments. Anything you say can be used to raise the ransom or accelerate data leaks.
Don't pay yet
Payment may violate OFAC sanctions and rarely returns clean data. Wait for a responder to evaluate decryptors and backups first.
Preserve what you see
Screenshot ransom notes, suspicious files, file extensions (.lockbit, .akira, .blackcat, etc.), and any unusual processes. Don't delete anything.
Notify a small circle only
Owner, IT lead, and your insurance broker. Wider notification can trigger panic — or alert an insider involved in the breach.
Call PTG
Our 24/7 line connects you to a responder, not a queue.
Incidents we respond to
PTG's incident response team is built for the threats actually hitting Long Island and NYC small and mid-sized businesses.
Ransomware & extortion
LockBit, Akira, BlackCat, Play, Medusa. Encryption containment, decryption evaluation, ransom coordination.
.jpeg)
Data breach & exfiltration
Identify what was taken, support NY SHIELD notification, produce forensic report for insurer.
Catastrophic system failure
When a crash could plausibly be a breach, or standard backups can't restore.
BEC & wire fraud
Compromised M365/Workspace, fraudulent wires, vendor invoice substitution, exec impersonation.
.jpeg)
Insider & account compromise
Departed-employee theft, privileged abuse, stolen creds on dark web markets.

Supply chain & 3rd party
When your vendor or MSP is breached and your data is exposed downstream.
How PTG's incident response works
PTG's incident response process is designed to swiftly address and mitigate threats. Our team acts quickly to contain incidents, ensuring minimal disruption to your business operations.
Triage & Containment
A responder is on your call within [RESPONSE SLA]. We collect facts, confirm scope, and immediately work to contain the spread — isolating endpoints, killing malicious processes, and blocking command-and-control traffic. By the end of hour one, the bleeding stops.
Eradication & Threat Actor Eviction
We identify the entry vector (phishing, exposed RDP, vulnerable VPN, compromised credentials), map every system the actor touched, and remove their access — including persistence mechanisms, backdoors, and scheduled tasks designed to bring them back. Forensic preservation runs in parallel.
Recovery & Hardening
We restore from clean backups or rebuild affected systems. Before anything reconnects, we close the entry vector and the misconfigurations that allowed lateral movement. You return to operations on a more defensible footprint than before the incident.
Post-Incident Review & Reporting
You receive a documented forensic report fit for your cyber insurance carrier, legal counsel, and regulators. We hold a closeout review with your leadership covering what happened, what changed, and what remains. If you don't already have one, we'll help build the incident response plan that turns the next event into a rehearsal, not a crisis.
Why Local Incident Response Matters
National DFIR firms are capable — until they need hands on your hardware at 9 PM on a Friday. PTG responds from Long Island. That means:
- On-site within hours, not days. Some incidents demand physical access, especially when networks are deliberately offline and remote tools can't reach.
- Regional regulatory familiarity. NY SHIELD Act, NY DFS Part 500 (if you touch financial services), and city-level breach notification obligations are home turf.
- Established local relationships. FBI Cyber Division (NYC field office), New York State Attorney General's office, and Long Island-based breach counsel and PR firms. We know who to call when escalation is needed.
- Continuity after the crisis. Most national IR firms hand you off the day the report ships. PTG's MSP team can take over hardened operations directly — so you're not rebuilding both your environment and your IT provider relationship at the same time.
Why Manhattan Businesses Choose ProActive
Medium length section heading goes here
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla.
Medium length section heading goes here
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla.
Medium length section heading goes here
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla.