Hacked: Defense

HACKED
When a local mid-sized company had a complete network
meltdown after being breached by an undetected malware infection,
IV4 stepped in.
Working round-the-clock the weekend before Christmas, IV4
engineers had the organization back up and running 3 days later.
HOW CRYPTOLOCKER WORKS
User receives spammed
message with malicious
attachment
Once downloaded, the malwareinfected system phones home to
its botnet controller
Malware encrypts data on all
connected drives and mapped
network shares
Ransom message is
displayed, stating the
deadline and the amount
ZERO DAY MALWARE INFECTION
In this case, the malware was an unknown computer virus meaning
antivirus software signatures did not exist.
IV4 was the first to identify
the undetected Cryptolocker
malware.
IV4 contacted Symantec and
Webroot and requested patches
for the malware.
Patches have now been rolled out globally.
BUSINESS IMPACT
125
All records were
breached,
company-wide.
Work stations
affected.
IV4 RESPONSE TIMELINE
FRIDAY AM:
IV4 contacted
by company
FRIDAY:
Engineers arrive onsite
WEEKEND
IV4 engineers work
Saturday & Sunday
MONDAY
Company is operational,
engineers continue to remediate
IV4 TECHNICAL RESPONSE
225
10 IV4 engineers
working onsite.
Total hours worked
to recover lost data.
7 worked over the
weekend.
HACKED: DEFENSE
SECURITYPRO
IV4'S INNOVATIVE APPROACH TO ASSESSING SECURITY POSTURE
AND NETWORK ACTIVITY ON A REAL-TIME CONTINUOUS BASIS.
Continuous monitoring of network
traffic for unauthorized devices and
suspicious activity
Know what's on your network
including physical, virtual, mobile,
and cloud assets.
Visualize, analyze, and review
compliance status, vulnerabilities,
with customized dashboards
Ongoing scanning of all assets
for known vulnerabilities, misconfigurations, and malware
Create a security-conscious culture
with management and development of
security processes and procedures
LEARN MORE
WHY CONTINUOUS MONITORING?
COMBAT CYBER CRIMINAL THREATS
60%
of all targeted attacks in 2014
struck small- and medium-sized
organizations
Source: Symantec
NEW TECHNOLOGY RISKS
25% of ALL mobile devices
encounter a threat each
month
Source: Skycure Mobile
Threat Defense
EMERGING REGULATORY COMPLIANCE REQUIREMENTS
"A static security program
provides a false sense of security
and will become increasingly
ineffective over time."
Federal Financial Institution
Examination Council
IDENTIFY AND COMBAT CYBER
THREATS AS THEY OCCUR.
CONTACT IV4.
IV4.com • Western NY: (585) 598-3300 • Central NY: (315) 424-7736