Attackers are unbiased and claim yet another big scalp. The bigger they are, the harder they fall, and not just from a data recovery perspective. Yes recovering systems from before the attack is a headache, but when it comes to reputation and customer trust, these are the bigger issues that organisations must face and deal with.

Aside from having to deal with getting systems 'back to normal', is the organisation really certain that the attacker isn't still lurking around somewhere, ready to bring them to their knees again?

This is where a combination of a threat hunting, forensic investigation, vulnerability assessment and full penetration testing can find some answers and reassurance. In addition to this, you don't just need a list of recommendations to strengthen your organisation's security posture, but you want help implementing what needs to be done. We understand that there are challenges and a lack of resources when it comes to trying to manage a multitude of assignments, and in these challenging times, your organisation must focus on its core markets and not allow itself to be distracted. 

Some questions to ask yourself:

  1. Does your organisation have an Incident Response plan?
  2. Does it work, i.e. has it been tried and tested?
  3. When was the last time your organisation tested this, what lessons were learned and were any changes actually implemented?
  4. Do you have the right people and resources to deal with cyber incidents, and do the people you count on know what to do?
  5. Are your staff trained in security awareness and has this training been put to the test to see its effectiveness?
  6. Is your organisation equipped with the resources and expertise to deal with an urgent cyber security incident?
  7. Do you have the means to call on a company 24/7 who specialise in cyber security, incident response and digital forensics who are familiar with you environment and can assist with minimum delay?

Unfortunately ransomware and other cyber attacks occur often and are far reaching. It's not just about finding a solution(s) to stop them, it is also about how to deal with incidents effectively and efficiently WHEN an attack happens.