ONE OF THE MOST WORRISOME QUESTIONS IN SECURITY TODAY: “AM I COMPROMISED?”
A Compromise Assessment enables your organization to conclusively answer one of the most worrisome questions in security today: “Am I compromised?” A Compromise Assessment determines where, when and how a compromise occurred in order to uncover and prioritize the most pressing threats to your business. By focusing on operating system-level artefacts, rather than the less-effective traditional “indicators of compromise,” We are able to quickly and effectively discover previously unknown attacks
Pre & Post Ransomware Assessment
Today’s ransomware campaigns are very different from what we have seen in the past. On the one hand, ransomware can be easily obtained and used successfully by criminals that have little to no hacking skills, often referred to as Ransomware as a Service (RaaS). On the other hand, we are seeing ransomware being used for much more than just ransoms. In some cases, we have seen it used as a diversion; first harvesting credentials for later use, and then encrypting the drive to keep IT staff occupied while the attacker covers their tracks and accomplishes even more nefarious objectives. And more recently, we are seeing highly opportunistic campaigns that encrypt entire networks in an organization and delete host backups prior to encryption, leaving the entire organization held hostage and unable to operate.
Ignition Technology offers two complementary service offerings to help organizations address this evolving threat.