In this Whitepaper, we would like to give you the opportunity to learn from the experiences of others, using the example of an actual cyber compromise of a typical – but unnamed – German hidden champion that fell victim to a ransomware attack (or Cyber Attack). In the case concerned, ransomware (also known as an extortion Trojan, extortion software or encryption Trojan) encrypted the IT systems, thereby rendering them unusable.
Topics of the white paper: