1 / 11

Cybersecurity Solution for a Drug Manufacturing Company

Explore how Nuvento solved and retrieved the encrypted files on the drug manufacturing company, as well as how they verified that the issue was fixed and that similar events did not occur again.

Patrick27
Download Presentation

Cybersecurity Solution for a Drug Manufacturing Company

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cybersecurity Solution for a Drug Manufacturing Company

  2. A major drug manufacturing company in the United States was targeted by ransomware. Cyber attackers encrypted their files and demanded a ransom to decrypt them. The company refused to pay the ransom or accept any solution from them.

  3. The drug manufacturing company approached Nuvento for a 3-4 day action plan to recover the encrypted files in their system. They wanted us to resolve the problem and prevent similar incidents from happening again.

  4. The Challenge The challenge for Nuvento was to find and remove the ransomware from their network. To investigate the situation and identify a viable solution, we deployed our Threat Hunting team, Vulnerability Assessment team, Cybersecurity team, and IT Infrastructure Support team.

  5. Our Solution We cleansed the entire network, removed the ransomware, and safeguarded their data from further cybersecurity breaches. Following were the measures taken: Install Antivirus Protection Threat Hunting Vulnerability Assessment

  6. Install Antivirus Protection; We discovered that some systems had anti- virus software that was outdated, while others had no antivirus protection at all. The first line of defence against the cyber- attack was to install standard antivirus software on all systems. As a result, we used standard antivirus software to protect each and every system

  7. Threat Hunting; For threat hunting, Nuvento installed the threat detection software Infocyte. We discovered some suspicious logs while running Infocyte. Our team notified the company about the infected systems, quarantined them, cleaned them, and reconnected them to their network.

  8. Vulnerability Assessment; We conducted vulnerability assessments using Tenable, a leading vulnerability management solution. Unsupported systems, open ports, out- of-date software, plugins, and web browsers were among the vulnerabilities discovered.

  9. Based on the vulnerability assessments, Nuvento made the following recommendations: Upgrade their systems to the latest Windows versions Change their Windows user accounts and service accounts permissions Upgrade firewall Use third-party service providers to protect from DDoS attacks Continue using InfoCyte to get malware alerts in their network

  10. Contact our team. When you contact our technology leaders, they will evaluate your specific business case and share a proof of concept with cost estimates, technology and developer effort requirements, and a timeline for the process. www.nuvento.com

More Related