{"id":1016,"date":"2021-03-10T10:18:28","date_gmt":"2021-03-10T16:18:28","guid":{"rendered":"https:\/\/idsinc.com\/?page_id=1016"},"modified":"2021-07-07T10:22:27","modified_gmt":"2021-07-07T16:22:27","slug":"recuperacion-rapida-de-un-ataque-de-ransomware","status":"publish","type":"page","link":"https:\/\/idsinc.com\/es\/case-studies\/quick-recovery-from-ransomware-attack\/","title":{"rendered":"Recuperaci\u00f3n r\u00e1pida de un ataque de ransomware"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-1016\" data-postid=\"1016\" class=\"themify_builder_content themify_builder_content-1016 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_sxix889 tb_first tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_dvve891 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_1zqw507 image-full-overlay   auto_fullwidth tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware-1024x512.jpg\" class=\"wp-post-image wp-image-1010\" title=\"iDiscovery Solutions Case Study - Ransomware Attack\" alt=\"iDiscovery Solutions Case Study, Ransomware Attack, Case Study, iDiscovery Solutions, malware, iDS cybersecurity team\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware-1024x512.jpg 1024w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware-300x150.jpg 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware-768x384.jpg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware-16x8.jpg 16w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_z67o610 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_cajx611 first\">\n                    <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_aw59458\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    DESAF\u00cdO            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_vvfw5\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p><em><strong>La oficina central de nuestro cliente fue atacada con ransomware que cifr\u00f3 docenas de computadoras, cerrando todas las operaciones.<\/strong><\/em><\/p>\n<p>Nuestro cliente sufri\u00f3 un debilitante ataque de ransomware, con malware que encriptaba el contenido de los sistemas de los usuarios y los servidores empresariales que conten\u00edan datos cr\u00edticos del cliente y de la empresa.<\/p>\n<p><strong>iDS se encarg\u00f3 de:<\/strong><\/p>\n<ul>\n<li>Identificar la fuente y el momento del ataque.<\/li>\n<li>Aislar el malware, erradicarlo de su entorno y restaurar sistemas, aplicaciones y datos.<\/li>\n<li>Monitoreo de operaciones para asegurar que el malware no resurja<\/li>\n<\/ul>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_fjro869\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Soluci\u00f3n            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_olr8818\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p><em><strong>Trajimos un equipo para identificar la fuente del ataque, identificar c\u00f3mo entr\u00f3 el malware, contenerlo y asegurarnos de que se entendiera el alcance del ataque. Luego trabajamos para restaurar los sistemas y hacer que el negocio volviera a funcionar.<\/strong><\/em><\/p>\n<p>iDS fue elegido en base a nuestra relaci\u00f3n con el cliente y nuestra profunda experiencia en ayudar a clientes con problemas similares.<\/p>\n<p><strong>Se elabor\u00f3 un plan de proyecto que inclu\u00eda:<\/strong><\/p>\n<ul>\n<li>Revisar registros y datos forenses para determinar la fuente y el alcance del compromiso<\/li>\n<li>Borrado de sistemas comprometidos, reinstalaci\u00f3n de sistemas operativos y restauraci\u00f3n de datos de buenas copias de seguridad conocidas que hab\u00edamos trabajado previamente para crear con la empresa<\/li>\n<li>Trabajar con el cliente para mejorar las defensas contra futuros ataques, incluida la capacitaci\u00f3n adicional del usuario, el monitoreo de la red y estrategias de copia de seguridad mejoradas.<\/li>\n<\/ul>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_h5vm641\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Resultado            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_17by0\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p><em><strong>El equipo de ciberseguridad de iDS realiz\u00f3 una investigaci\u00f3n para identificar y aislar el malware, restaurar las operaciones y evitar la p\u00e9rdida de m\u00e1s de $1.5 millones en ingresos por d\u00eda. Adem\u00e1s, preparamos un informe que permiti\u00f3 a nuestro cliente obtener el reembolso total de nuestros servicios de su p\u00f3liza de seguro de ciberseguridad.<\/strong><\/em><\/p>\n<p>El equipo de ciberseguridad altamente experimentado de iDS respondi\u00f3 r\u00e1pidamente a las necesidades del cliente y lo devolvi\u00f3 a las operaciones normales en cuesti\u00f3n de horas. Les evitamos perder millones en ingresos potenciales, les ayudamos con la recuperaci\u00f3n del seguro por sus costos y tomamos medidas para reducir la probabilidad de que tuvieran que lidiar con el mismo problema en el futuro.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>Our client\u2019s headquarters office was hit with ransomware that encrypted dozens of computers, shutting all operations down. Our client was hit with a debilitating ransomware attack, with malware that encrypted the contents of both user systems and enterprise servers containing critical client and firm data. iDS was tasked with: Identifying the source and timing of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1010,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"team":[],"class_list":["post-1016","page","type-page","status-publish","has-post-thumbnail","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Quick Recovery from Ransomware Attack - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"iDS&#039;s client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/es\/estudios-de-caso\/recuperacion-rapida-de-un-ataque-de-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quick Recovery from Ransomware Attack\" \/>\n<meta property=\"og:description\" content=\"iDS&#039;s client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/es\/estudios-de-caso\/recuperacion-rapida-de-un-ataque-de-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-07T16:22:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/\",\"name\":\"Quick Recovery from Ransomware Attack - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/iDS-Case-Study-Ransomware.jpg\",\"datePublished\":\"2021-03-10T16:18:28+00:00\",\"dateModified\":\"2021-07-07T16:22:27+00:00\",\"description\":\"iDS's client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/iDS-Case-Study-Ransomware.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/iDS-Case-Study-Ransomware.jpg\",\"width\":1200,\"height\":600,\"caption\":\"iDS's client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Studies\",\"item\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Quick recovery from ransomware attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Recuperaci\u00f3n r\u00e1pida de un ataque de ransomware - iDiscovery Solutions","description":"El cliente de iDS sufri\u00f3 un ataque de ransomware con malware que cifraba el contenido de los servidores que conten\u00edan datos cr\u00edticos del cliente y de la empresa.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/es\/estudios-de-caso\/recuperacion-rapida-de-un-ataque-de-ransomware\/","og_locale":"es_ES","og_type":"article","og_title":"Quick Recovery from Ransomware Attack","og_description":"iDS's client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data.","og_url":"https:\/\/idsinc.com\/es\/estudios-de-caso\/recuperacion-rapida-de-un-ataque-de-ransomware\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_modified_time":"2021-07-07T16:22:27+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/","url":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/","name":"Recuperaci\u00f3n r\u00e1pida de un ataque de ransomware - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware.jpg","datePublished":"2021-03-10T16:18:28+00:00","dateModified":"2021-07-07T16:22:27+00:00","description":"El cliente de iDS sufri\u00f3 un ataque de ransomware con malware que cifraba el contenido de los servidores que conten\u00edan datos cr\u00edticos del cliente y de la empresa.","breadcrumb":{"@id":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware.jpg","width":1200,"height":600,"caption":"iDS's client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Case Studies","item":"https:\/\/idsinc.com\/case-studies\/"},{"@type":"ListItem","position":3,"name":"Quick recovery from ransomware attack"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Soluciones iDiscovery","description":"Utilice los datos a su favor en la sala del tribunal","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Soluciones iDiscovery","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS ofrece soluciones de datos consultivas a corporaciones y bufetes de abogados de todo el mundo, lo que les otorga una ventaja decisiva, tanto dentro como fuera de los tribunales. Los expertos en la materia y los estrategas de datos de iDS se especializan en encontrar soluciones a problemas de datos complejos, garantizando que los datos puedan aprovecharse como un activo, no como un pasivo.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"}]}},"builder_content":"\n<h1>CHALLENGE<br\/><\/h1>\n<p><em><strong>Our client\u2019s headquarters office was hit with ransomware that encrypted dozens of computers, shutting all operations down.<\/strong><\/em><\/p> <p>Our client was hit with a debilitating ransomware attack, with malware that encrypted the contents of both user systems and enterprise servers containing critical client and firm data.<\/p> <p><strong>iDS was tasked with:<\/strong><\/p> <ul> <li>Identifying the source and timing of the attack<\/li> <li>Isolating the malware, eradicating it from their environment, and restoring systems, applications, and data<\/li> <li>Monitoring operations to ensure that the malware did not resurface<\/li> <\/ul>\n<h1>Solution<br\/><\/h1>\n<p><em><strong>We brought in a team to identify the source of the attack, pinpoint how the malware got in, contain it, and ensure that the scope of the attack was understood. Then we worked to restore systems and get the business back up and running.<\/strong><\/em><\/p> <p>iDS was chosen based on our relationship with the client and our deep experience in assisting clients with similar issues.<\/p> <p><strong>A project plan was drawn up which included:<\/strong><\/p> <ul> <li>Reviewing logs and forensic data to determine the source and extent of the compromise<\/li> <li>Wiping compromised systems, reinstalling operating systems, and restoring data from known good backups that we had previously worked to create with the firm<\/li> <li>Working with the client to improve defenses against future attacks, including additional user training, network monitoring, and enhanced backup strategies<\/li> <\/ul>\n<h1>Result<br\/><\/h1>\n<p><em><strong>The iDS cybersecurity team conducted an investigation to identify and isolate the malware, restoring operations and preventing the loss of more than $1.5 million in revenue per day. In addition, we prepared a report that allowed our client to get full reimbursement for our services from their cybersecurity insurance policy.<\/strong><\/em><\/p> <p>The highly experienced iDS cybersecurity team quickly responded to the client\u2019s needs and got them back to normal operations in a matter of hours. We saved them from losing millions in potential revenue, assisted with insurance recovery for their costs, and took steps to reduce the likelihood that they would need to deal with the same issue in the future.<\/p>","_links":{"self":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/pages\/1016","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/comments?post=1016"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/pages\/1016\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/pages\/33"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media\/1010"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/media?parent=1016"}],"wp:term":[{"taxonomy":"team","embeddable":true,"href":"https:\/\/idsinc.com\/es\/wp-json\/wp\/v2\/team?post=1016"}],"curies":[{"name":"gracias","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}