The client for this case is a pioneer for remote staffing and outsourcing. Specialized for quickly providing skilled staff at affordable rates, they are ideal for businesses who need to scale effectively and find the traditional hiring process time consuming and expensive. Given that they provide staff to work remotely, much of their assets are online, hence why they want to ensure the best level of cybersecurity.
The client faced an attempt to perform a privileged operation. Our SOC quickly received the request and worked to counter it.
1. The request was received by the SOC
2. They quickly began an analysis of all the assets involved
3. One device was found to be compromised
4. The files on the device were analyzed to pinpoint the source of the attack
5. Once identified, the threat was stopped
The moment the attack began, our SOC immediately reacted and worked to identify how and
where the threat originated. Once the threat was neutralized, we presented a report to the client
for their reference. They found it informative and helped to avoid a similar situation in the future.