Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 26 September, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Case Study – Alchemy Transmutes Ransomware into Solid Gold Security

by The Gurus
May 12, 2016
in Case Studies
Share on FacebookShare on Twitter

Every day you hear of a hospital, school, government department or business being attacked by Ransomware, disabling their networks by encrypting important files. Recent security reports show over 90% of businesses were the target of a cyberattack in 2015, and 1 in 5 will be successfully infected with Ransomware during 2016.
Attackers no longer need to be technical whizz-kids with ‘off the shelf’ Ransomware toolkits available on the ‘dark-web’ for as little as £100 upfront or a share of the spoils through an affiliate model to infect as many businesses as possible.
Small and Medium-sized Businesses (SMBs), who don’t have a dedicated IT Security person and sophisticated defenses in place, are especially vulnerable.
This was the situation an award-winning building consultancy firm found itself in. Attacked by ransomware which bypassed their antivirus and encrypted all their valuable files and network backups.
As a professional services organization, failure to restore their network quickly would be disastrous risking both the building consultancy’s reputation and business. They needed some specialist IT advice so they called upon Alchemy Systems, an IT solutions company who offer a full managed security service.
Solution
As the ransomware had bypassed the consultancies existing antivirus Alchemy deep-cleaned the entire network and removed all traces of the infection.
Alchemy installed Adaptive Defense 360 from Panda Security which combines an advanced antivirus along with Endpoint Detection and Response technology to classify all active applications and stop future breaches.
There was only 7 days downtime from the initial infection to Alchemy having the consultancy business back up and running minimizing business impact.
“With Adaptive Defense 360 the process of securing the network using a single solution was much more efficient”, said Nathan Mills, Managing Director of Alchemy Systems, “and once implemented we could see suspicious activities being automatically classified and blocked without any need for manual intervention.”
View the case study to see how Alchemy Systems protect their clients:  http://resources.pandasecurity.com/enterprise/solutions/adaptivedefense/Adaptive_Defense-case_study-Alchemy-systems-en.pdf

FacebookTweetLinkedIn
ShareTweet
Previous Post

Research Points out the Concerning Lack of Device Security in the Enterprise

Next Post

Survey of 1,000 UK consumers reveals high-profile cyber attacks are having an impact on consumer trust in big brands

Recent News

CREST and IASME announce partnership with the NCSC to deliver Cyber Incident Exercising scheme

September 26, 2023
partnership

Cyberelements Partners with ABC Distribution Partners to Revolutionise Privileged Access Management in Europe

September 26, 2023
Adarma Names James Todd as Chief Technology Officer, Reinforcing Dedication to Security Operations Excellence

Adarma Names James Todd as Chief Technology Officer, Reinforcing Dedication to Security Operations Excellence

September 25, 2023
Nurturing Our Cyber Talent

Nurturing Our Cyber Talent

September 25, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information