{"id":1016,"date":"2021-03-10T10:18:28","date_gmt":"2021-03-10T16:18:28","guid":{"rendered":"https:\/\/idsinc.com\/?page_id=1016"},"modified":"2021-07-07T10:22:27","modified_gmt":"2021-07-07T16:22:27","slug":"recuperation-rapide-apres-une-attaque-de-ransomware","status":"publish","type":"page","link":"https:\/\/idsinc.com\/fr\/case-studies\/quick-recovery-from-ransomware-attack\/","title":{"rendered":"R\u00e9cup\u00e9ration rapide apr\u00e8s une attaque de ransomware"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-1016\" data-postid=\"1016\" class=\"themify_builder_content themify_builder_content-1016 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_sxix889 tb_first tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_dvve891 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_1zqw507 image-full-overlay   auto_fullwidth tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware-1024x512.jpg\" class=\"wp-post-image wp-image-1010\" title=\"iDiscovery Solutions Case Study - Ransomware Attack\" alt=\"iDiscovery Solutions Case Study, Ransomware Attack, Case Study, iDiscovery Solutions, malware, iDS cybersecurity team\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware-1024x512.jpg 1024w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware-300x150.jpg 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware-768x384.jpg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware-16x8.jpg 16w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_z67o610 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_cajx611 first\">\n                    <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_aw59458\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    D\u00c9FI            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_vvfw5\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p><em><strong>Le si\u00e8ge social de notre client a \u00e9t\u00e9 touch\u00e9 par un logiciel de ran\u00e7on qui a chiffr\u00e9 des dizaines d&#039;ordinateurs, arr\u00eatant toutes les op\u00e9rations.<\/strong><\/em><\/p>\n<p>Notre client a \u00e9t\u00e9 victime d&#039;une attaque de ransomware d\u00e9bilitante, avec un logiciel malveillant qui cryptait le contenu des syst\u00e8mes des utilisateurs et des serveurs d&#039;entreprise contenant des donn\u00e9es critiques sur les clients et l&#039;entreprise.<\/p>\n<p><strong>iDS a \u00e9t\u00e9 charg\u00e9 de\u00a0:<\/strong><\/p>\n<ul>\n<li>Identifier la source et le moment de l&#039;attaque<\/li>\n<li>Isoler les logiciels malveillants, les \u00e9radiquer de leur environnement et restaurer les syst\u00e8mes, les applications et les donn\u00e9es<\/li>\n<li>Surveillance des op\u00e9rations pour s&#039;assurer que le logiciel malveillant n&#039;a pas refait surface<\/li>\n<\/ul>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_fjro869\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Solution            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_olr8818\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p><em><strong>Nous avons fait appel \u00e0 une \u00e9quipe pour identifier la source de l&#039;attaque, d\u00e9terminer comment le logiciel malveillant s&#039;est introduit, le contenir et nous assurer que la port\u00e9e de l&#039;attaque a \u00e9t\u00e9 comprise. Ensuite, nous avons travaill\u00e9 pour restaurer les syst\u00e8mes et remettre l&#039;entreprise en marche.<\/strong><\/em><\/p>\n<p>iDS a \u00e9t\u00e9 choisi sur la base de notre relation avec le client et de notre exp\u00e9rience approfondie dans l&#039;assistance aux clients confront\u00e9s \u00e0 des probl\u00e8mes similaires.<\/p>\n<p><strong>Un plan de projet a \u00e9t\u00e9 \u00e9tabli comprenant :<\/strong><\/p>\n<ul>\n<li>Examen des journaux et des donn\u00e9es m\u00e9dico-l\u00e9gales pour d\u00e9terminer la source et l&#039;\u00e9tendue de la compromission<\/li>\n<li>Effacer les syst\u00e8mes compromis, r\u00e9installer les syst\u00e8mes d&#039;exploitation et restaurer les donn\u00e9es \u00e0 partir de bonnes sauvegardes connues que nous avions pr\u00e9c\u00e9demment travaill\u00e9 \u00e0 cr\u00e9er avec l&#039;entreprise<\/li>\n<li>Travailler avec le client pour am\u00e9liorer les d\u00e9fenses contre les attaques futures, y compris une formation suppl\u00e9mentaire des utilisateurs, la surveillance du r\u00e9seau et des strat\u00e9gies de sauvegarde am\u00e9lior\u00e9es<\/li>\n<\/ul>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_h5vm641\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    R\u00e9sultat            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_17by0\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <p><em><strong>L&#039;\u00e9quipe de cybers\u00e9curit\u00e9 d&#039;iDS a men\u00e9 une enqu\u00eate pour identifier et isoler le logiciel malveillant, restaurer les op\u00e9rations et \u00e9viter la perte de plus de $1,5 million de revenus par jour. De plus, nous avons pr\u00e9par\u00e9 un rapport qui a permis \u00e0 notre client d&#039;obtenir le remboursement int\u00e9gral de nos services \u00e0 partir de sa police d&#039;assurance cybers\u00e9curit\u00e9.<\/strong><\/em><\/p>\n<p>L&#039;\u00e9quipe de cybers\u00e9curit\u00e9 hautement exp\u00e9riment\u00e9e d&#039;iDS a rapidement r\u00e9pondu aux besoins du client et les a ramen\u00e9s \u00e0 des op\u00e9rations normales en quelques heures. Nous leur avons \u00e9vit\u00e9 de perdre des millions de revenus potentiels, les avons aid\u00e9s \u00e0 recouvrer leurs frais d&#039;assurance et avons pris des mesures pour r\u00e9duire la probabilit\u00e9 qu&#039;ils aient \u00e0 faire face au m\u00eame probl\u00e8me \u00e0 l&#039;avenir.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>Our client\u2019s headquarters office was hit with ransomware that encrypted dozens of computers, shutting all operations down. Our client was hit with a debilitating ransomware attack, with malware that encrypted the contents of both user systems and enterprise servers containing critical client and firm data. iDS was tasked with: Identifying the source and timing of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1010,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"team":[],"class_list":["post-1016","page","type-page","status-publish","has-post-thumbnail","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Quick Recovery from Ransomware Attack - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"iDS&#039;s client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/fr\/etudes-de-cas\/recuperation-rapide-apres-une-attaque-de-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quick Recovery from Ransomware Attack\" \/>\n<meta property=\"og:description\" content=\"iDS&#039;s client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/fr\/etudes-de-cas\/recuperation-rapide-apres-une-attaque-de-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-07T16:22:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/\",\"name\":\"Quick Recovery from Ransomware Attack - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/iDS-Case-Study-Ransomware.jpg\",\"datePublished\":\"2021-03-10T16:18:28+00:00\",\"dateModified\":\"2021-07-07T16:22:27+00:00\",\"description\":\"iDS's client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/iDS-Case-Study-Ransomware.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/iDS-Case-Study-Ransomware.jpg\",\"width\":1200,\"height\":600,\"caption\":\"iDS's client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/quick-recovery-from-ransomware-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Studies\",\"item\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Quick recovery from ransomware attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"R\u00e9cup\u00e9ration rapide apr\u00e8s une attaque de ransomware - iDiscovery Solutions","description":"Le client d&#039;iDS a \u00e9t\u00e9 victime d&#039;une attaque de ransomware avec un logiciel malveillant qui a chiffr\u00e9 le contenu des serveurs contenant les donn\u00e9es critiques du client et de l&#039;entreprise.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/fr\/etudes-de-cas\/recuperation-rapide-apres-une-attaque-de-ransomware\/","og_locale":"fr_FR","og_type":"article","og_title":"Quick Recovery from Ransomware Attack","og_description":"iDS's client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data.","og_url":"https:\/\/idsinc.com\/fr\/etudes-de-cas\/recuperation-rapide-apres-une-attaque-de-ransomware\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_modified_time":"2021-07-07T16:22:27+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/","url":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/","name":"R\u00e9cup\u00e9ration rapide apr\u00e8s une attaque de ransomware - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware.jpg","datePublished":"2021-03-10T16:18:28+00:00","dateModified":"2021-07-07T16:22:27+00:00","description":"Le client d&#039;iDS a \u00e9t\u00e9 victime d&#039;une attaque de ransomware avec un logiciel malveillant qui a chiffr\u00e9 le contenu des serveurs contenant les donn\u00e9es critiques du client et de l&#039;entreprise.","breadcrumb":{"@id":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/03\/iDS-Case-Study-Ransomware.jpg","width":1200,"height":600,"caption":"iDS's client was hit with a ransomware attack with malware that encrypted the contents of servers containing critical client and firm data."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/case-studies\/quick-recovery-from-ransomware-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Case Studies","item":"https:\/\/idsinc.com\/case-studies\/"},{"@type":"ListItem","position":3,"name":"Quick recovery from ransomware attack"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Solutions d&#039;iD\u00e9couverte","description":"Utilisez les donn\u00e9es \u00e0 votre avantage dans la salle d\u2019audience","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Solutions d&#039;iD\u00e9couverte","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS fournit des solutions de donn\u00e9es consultatives aux entreprises et aux cabinets d&#039;avocats du monde entier, leur donnant un avantage d\u00e9cisif, tant \u00e0 l&#039;int\u00e9rieur qu&#039;\u00e0 l&#039;ext\u00e9rieur de la salle d&#039;audience. Les experts en la mati\u00e8re et les strat\u00e8ges en donn\u00e9es d&#039;iDS se sp\u00e9cialisent dans la recherche de solutions \u00e0 des probl\u00e8mes de donn\u00e9es complexes, garantissant que les donn\u00e9es peuvent \u00eatre exploit\u00e9es comme un atout et non comme un passif.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"}]}},"builder_content":"\n<h1>CHALLENGE<br\/><\/h1>\n<p><em><strong>Our client\u2019s headquarters office was hit with ransomware that encrypted dozens of computers, shutting all operations down.<\/strong><\/em><\/p> <p>Our client was hit with a debilitating ransomware attack, with malware that encrypted the contents of both user systems and enterprise servers containing critical client and firm data.<\/p> <p><strong>iDS was tasked with:<\/strong><\/p> <ul> <li>Identifying the source and timing of the attack<\/li> <li>Isolating the malware, eradicating it from their environment, and restoring systems, applications, and data<\/li> <li>Monitoring operations to ensure that the malware did not resurface<\/li> <\/ul>\n<h1>Solution<br\/><\/h1>\n<p><em><strong>We brought in a team to identify the source of the attack, pinpoint how the malware got in, contain it, and ensure that the scope of the attack was understood. Then we worked to restore systems and get the business back up and running.<\/strong><\/em><\/p> <p>iDS was chosen based on our relationship with the client and our deep experience in assisting clients with similar issues.<\/p> <p><strong>A project plan was drawn up which included:<\/strong><\/p> <ul> <li>Reviewing logs and forensic data to determine the source and extent of the compromise<\/li> <li>Wiping compromised systems, reinstalling operating systems, and restoring data from known good backups that we had previously worked to create with the firm<\/li> <li>Working with the client to improve defenses against future attacks, including additional user training, network monitoring, and enhanced backup strategies<\/li> <\/ul>\n<h1>Result<br\/><\/h1>\n<p><em><strong>The iDS cybersecurity team conducted an investigation to identify and isolate the malware, restoring operations and preventing the loss of more than $1.5 million in revenue per day. In addition, we prepared a report that allowed our client to get full reimbursement for our services from their cybersecurity insurance policy.<\/strong><\/em><\/p> <p>The highly experienced iDS cybersecurity team quickly responded to the client\u2019s needs and got them back to normal operations in a matter of hours. We saved them from losing millions in potential revenue, assisted with insurance recovery for their costs, and took steps to reduce the likelihood that they would need to deal with the same issue in the future.<\/p>","_links":{"self":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/pages\/1016","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/comments?post=1016"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/pages\/1016\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/pages\/33"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media\/1010"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media?parent=1016"}],"wp:term":[{"taxonomy":"team","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/team?post=1016"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}