...

Incident Response

Data Breaches     Disruptions     Cyberattacks

The goal is to keep your business running after an attack or a disaster, while recovering lost data or systems.

DataSecurity_Feature_SecurityCam

What we do:

We respond to disruptions, breaches, and attacks. We help you assess the loss. We work to restore access to your systems and files, and we help you regain your balance.

We’re considerate of your staff and your customers while we execute necessary procedures.

We bring the most effective tools, and up-to-date training. We apply the newest countermeasures. We monitor current technology. We test before we use, and we only use what works.

What we don’t do:

We never discuss your business with anyone else.
We don’t tell you how to run your business.
We don’t make claims we can’t support.
We never pack up and leave without recommending ways to mitigate the effects of future disasters.

A few incidents from our files:

  • A medical facility traced network intrusions to a former employee. Data Clone Labs implemented security upgrades, including two-factor authentication.
  • An engineering firm found its files suddenly inaccessible, locked out by an offsite service provider.  Data Clone Labs found an unconventional (proprietary) approach to recovering critical files.
  • An electronics manufacturing company discovered its bank account was emptied by a cyberattack. Data Clone Labs was able to accomplish partial tracing and retrieval of funds.
  • A client in New York found its business files hijacked by ransomware, with a demand for a large sum of money in return for the files. Data Clone Labs guided the staff to an alternate data recovery methods, and deployed measures to reduce the likelihood of a repeat attack.
  • Email and business records inaccessible due to a natural disaster. Data Clone Labs deployed a cloud-based system for remote recovery and access.

OUR AFFILIATIONS

SANS
ISACA
HTCIA
Affilitations_GIACLogo