Let's start here with the questions...

We have provided some FAQs as a simple guideline. You cannot use universal templates in your environment and expect to bring level of service on satisfying level.

We estimate our client needs, develop a solution specifically tailored for them, to fit perfectly into their environment. As a team, our effort is keeping optimal and reasonable balance between security and operations.

For any question/requirement bellow, feel free to contact us if you need an assistance.

We have provided some FAQs as a simple guideline. You cannot use universal templates in your environment and expect to bring level of service on satisfying level.

We estimate our client needs, develop a solution specifically tailored for them, to fit perfectly into their environment. As a team, our effort is keeping optimal and reasonable balance between security and operations.

Can you help us managing our server and network infrastructure?

Yes. We have a support team of engineers and technicians that can help you with your server infrastructure.

We are a team of developers, we need to have infrastructure deployed in cloud environment. Can you deploy and/or manage it for us?

Yes, we can. Most of our work is close cooperation and support for DEV teams, both on Windows and Linux.

We cannot send/receive emails. Any ideas?

It can be several reasons:

  • Internet connection
  • Antivirus software blocking email traffic
  • Email server issues
  • Being blacklisted
  • Domain related issues

Troubleshooting is required on several levels of complexity.

We have local servers and storage. Can we move it to cloud?

Yes. We can implement various solutions to accommodate client’s needs. You can have it on any cloud provider you like.

We have local serves. Can we create backup in cloud?

Yes. In addition, that is a great step to lower ransomware threat.

How can we simplify user account management?

There are open source and proprietary solutions. Using solution, like Microsoft Active Directory services, can simplify and provide centralized user management. In addition, it can do much more than that, leveraging your environment security and manageability to the completely new level.

Can we connect our on premise infrastructure with cloud services?

Yes, there are numerous ways to do that, depending on existing setup. We can make your cloud services accessible from local network.

We want our own email and web server. Can we deploy it in cloud?

Yes. In addition, DNS domain reconfiguration are required for new services to function correctly.

Can we have centrally managed antivirus solution?

Yes. There are cloud managed and locally managed antivirus solution. Depending on your needs, together, we can choose best solution for you.

We need a simple local backup solution, but do not know where to start?

Depending on your needs, an automated local solution is configured.

Emergency Room

We had a ransomware attack! What to do?

When you identify the attack, here are some generic steps:

  • Cut the cord! Of course, not literally. At this moment, you know that the infection took place. It is crucial to act quickly, identify, and shut down the origin of the infection. Take shared locations offline.
  • Identify source of infection (a.k.a Patent Zero), and shut it down. Unplug infected device from network, remove connected USB storage, especially if there is a backup there.
  • Identify the infection and take photos. Usually, you can find a TXT file containing some data that can be useful. Recovery can depend on it.
  • Be aware of your situation. Expect downtime, inform your superiors.
  • Inform superiors and management what happened and about expected downtime.
  • Plan for recovery/decrypting. There are 2 options, restore backup, if you have created or pay ransom.

Restoring backup – restoring assumes that you have some backup policy in place, so you can perform recovery.

Paying ransom – First, you take a high risk when communicating with criminal entities. While paying the criminals for ransom is highly discouraged, sometimes it is the only solution to continue working. You must be aware that experience, when paying ransom, is different with everybody. You do not know what to expect. Some people got all data back; the very same people infected others again after paying the ransom.

Ransom is paid in bitcoin.

How to prevent ransomware attacks?

First thing that you should know is that there is no 100% protection from viruses and malware if you are connected to internet.

Nevertheless, prevention efforts are important and they can make a difference. Educate your employees, make policies and implement technical security measures. The ransomware threat can be lowered implementing Business continuity and Prevention efforts.