The very nature of our work in cyber security is extremely sensitive and most often concerns highly proprietary data and very delicate circumstances. As a result, all of our clients request anonymity due to the unique nature of their respective situations.
The case studies presented here are several companies and NGOs’ who have consented to going public about their cyber attacks, how they were compromised and how Forensic Scan was able to assist them quickly and efficiently get back to business and daily operations.
While the stories presented here are unique to these specific organizations, please note that various and multiple versions of these same cyber attacks occur daily in businesses and organizations of all sizes throughout the world.
We urge you to ponder the direct and indirect costs to your company or organization as you read these case studies and consider how you would respond when – not if – you are the victim of a cyber attack.
Forensic Scan Identifies Infected Files in Less than 24 Hours
(Oil & gas; FOCUS: Business leaders)
A mid-tier oil and gas company discovered that their financial information had been compromised but were unable to determine how or where. Using Forensic Scan the Partner was able to determine the location of the breech and the type of malware threat in under 24 hours.
Forensic Scan Enables Reseller Cyopsis to Expand Professional Services
(Oil & gas; FOCUS: IT Services and Resellers)
A regional cyber security firm identified numerous instances of malware on several files of their oil and gas company client but knew that there was more that they could not find. Using Forensic Scan, the Partner discovered 170 instances of malware – 100 in regular files and 72 in deleted files – in less than 24 hours.
Threats to Business-Critical Assets (Enterprise; FOCUS: Business Leaders)
A series of cyber attacks and immature IT security systems left an enterprise increasingly vulnerable to more malicious cyber threats. Forensic Scan identified the threats and helped the company institute a series of cyber security best practices.
Political-Inspired Hacking of Fundraising Program (NGO; FOCUS: Business leaders)
A well-known NGO was the victim of a well-planned and intentional cyber attack to compromise their donor database during a critical period of time for fundraising. Forensic Scan quickly discovered and identified the threat and helped the NGO eradicate it so that their fundraising program could proceed as planned.