CRA was engaged by a global data processing company to perform a compromise assessment after a large competitor suffered a widely publicized breach. CRA obtained endpoint visibility and performed threat hunting across the environment. CRA found several instances of malware as well as shortcomings in the environment’s security posture such as unmanaged assets and outdated software. The client was quickly able to remove the malware from their environment, update the outdated software, and improve their security posture.
Are big ransom payments a smart response to the global menace of ransomware?
Many companies find it helpful to assess the associated risks through multiple lenses, including: “Business Risk” lens Reputation: payments can strengthen the...