Disaster: Cyber Attack

What to do when a disaster strikes...

Mockup_Whitepaper IT-Security_EN

In this Whitepaper, we would like to give you the opportunity to learn from the experiences of others, using the example of an actual cyber compromise of a typical – but unnamed – German hidden champion that fell victim to a ransomware attack. In the case concerned, ransomware (also known as an extortion Trojan, extortion software or encryption Trojan) encrypted the IT systems, thereby rendering them unusable.

Topics of the white paper:

  • After the initial shock: Documenting evidence and the course of events
  • Imporant measures?
  • To pay or not to pay?
  • The “No-Pay” scenario Advantages and disadvantages
  • The “Pay” scenario Advantages and disadvantages
  • Disaster Contingencies

Please fill out this form to download the white paper!