This paper outlines the steps taken to secure part of a network belonging to a telecommunications company that was compromised earlier this year. The material gives an overview of the incident handling procedure applied and the follow up vulnerability and risk assessments.