Every Ransomware Assessments engagement we perform will take a three-pronged approach to validate all aspects of your security against ransomware:
As part of our collaborative planning and preparation process, you’ll walk us through your environment as we use a Ransomware assessment toolkit to baseline your current capabilities.
We’ll perform penetration testing focused on the most common attack vectors for ransomware and applicable to your environment.
In addition to reviewing documented policies and procedures, we’ll either conduct ransomware training with your employees or simulate a purple team-style exercise to understand how your organization would respond to a ransomware attack.
When testing, training, and exercises are completed, we‘ll document our findings, including vulnerabilities and gaps in your response process.
After we provide you with our conclusions, you’ll have time to remediate any discovered gaps and make necessary improvements.
If you should request, we’ll perform a retest of the findings from penetration testing and provide an updated report. You do also have the option to add an external-facing report if you’d like to provide something to your customers.