EVALUATING YOUR EXPOSURE TO A CYBER ATTACK

Your best defense against a ransomware attack begins with developing a comprehensive ransomware preparedness strategy. Elements of the plan should include determining the impact of an attack on your business, developing a disaster recovery/business continuity plan, and focusing on prevention.

Ransomware Readiness - Detection Assessment
cyber attack-11 seconds

EVERY 11 SECONDS

there is a ransomware attack on a business

cyber attack-20 billion-ransomware

$20 BILLION

in ransomware damage costs — a 57X increase in five years

The first, most important, step you can take when it comes to defending against a ransomware attack is to determine where you are most vulnerable. That means conducting a comprehensive assessment of your entire technology environment.

THE DG TECHNOLOGY SOLUTION

DG Technology is a customer-centric technology expert and business consultant that delivers services and products to minimize your information security, compliance, and business risks. We use a proven methodology that focuses on thoroughly understanding your needs and challenges, enabling us to recommend the most appropriate tools and technology for you.

Our Ransomware Readiness and Detection Assessment evaluates your endpoint, web, and email security to determine areas at risk and your readiness to detect and prevent ransomware attacks. The assessment consists of three main phases.

Ransomware Readiness - Detection Assessment-phase 1

PHASE 1:
Project Kick-Off

Prior to the start of the engagement, we meet with your project team to prepare for the assessment. The communication process continues throughout the entire project. During this phase, we jointly:

  • Coordinate activities, schedules, and resources
  • Confirm with your project team the exact scope of the assessment and validate assumptions
  • Set and verify expectations and requirements
  • Provide system requirements
Ransomware Readiness - Detection Assessment-phase 2

PHASE 2:
Assessment

During this phase, we:

  • Test to determine the ability of the email platform to detect custom malware
  • Test endpoints with client standard configuration
  • Run simulations to determine the ability to detect common attack scenarios
  • Test web security
  • Test for the ability to exfiltrate data
  • Provide weekly status updates
Ransomware Readiness - Detection Assessment-phase 3

PHASE 3:
Reporting & Remediation

Following the assessment, we meet with your project team to report on our findings. This includes:

  • Guidance on remediation steps
  • Up to four hours of tuning support
  • Detailed report with findings and recommendations

THE DG DIFFERENCE

We know what it’s like to manage a technology lifecycle. Our years of industry and technology experience combined with intimate knowledge of your business enables us to provide solutions to minimize ransomware risks that can damage your business.

We put you in the center of everything we do with a “virtuous cycle” engagement process. We begin by learning everything we can about your business and by building a relationship with you, so we continually provide important feedback. This approach results in a risk management solution customized for your specific IT and business environment. Our ongoing interaction and growing understanding of your business over time ensures we continually modify our solutions and recommendations to meet your evolving needs.