Saving IT with expertise

Saving IT with expertise

Share post

Incident response at Magnetbau Schramme: Save IT with expertise. Thanks to G DATA CyberDefense, Magnetbau Schramme was quickly back to work after a ransomware attack.

A badly secured computer is enough for cyber criminals to smuggle ransomware into the company network and paralyze the IT infrastructure. Magnetbau Schramme also had to experience this. The incident response specialists from G DATA CyberDefense helped restore the systems and then improved IT security.

No 100 percent security

There is no such thing as one hundred percent IT security. Magnetbau also had to have this experience

Make a scratch. Thanks to good preparation and active help from G DATA CyberDefense, the manufacturer of electromagnets was quickly able to act again after a successful ransomware attack and was able to restore the systems. In June 2019, ransomware attacked the company's network and encrypted data. Instead of responding to the ransom demand, the family business commissioned the incident response specialists from G DATA to rid the systems of the ransomware, make the IT infrastructure operational again and ensure that the attackers no longer have access to it.

"In this exceptional situation, the cooperation with the specialists worked very well," says Marcello Ficht, Head of IT at Magnetbau Schramme. “We worked closely together and quickly found solutions. A precise analysis of the course of events was also important to improve IT security. "

Disinfect and restore systems.

"It was important to have a precise analysis of the course of events." Marcello Ficht, Head of IT at Magnetbau Schramme

With specially tailored software, the G DATA experts identified all infected systems and cleaned them up completely. The Restoration of the data was easy to manage, which was due to the company's backup strategy. With strong IT security measures and comprehensive documentation, all systems could be cleaned up and, where necessary, set up again within four days.

"Thanks to the immediate help from G DATA and our good IT security strategy, we were able to repair the damage quickly and were soon able to act again," says Marcello Ficht. "Due to the separate networks, production could continue to work almost without restriction, so that the financial damage was limited."

The advantages for Magnetbau Schramme

  • Fast recovery of all IT systems after a ransomware attack
  • Competent immediate help on site
  • Little downtime of the IT infrastructure
  • Comprehensive expertise in forensic analysis and IT security

A case study as a PDF on Magnetbau Schramme with many more details can be found online at G DATA.

To the case study as PDF at GDATA.de

 


About G Data

With comprehensive cyber defense services, the inventor of the anti-virus enables companies to defend themselves against cybercrime. Over 500 employees ensure the digital security of companies and users. Made in Germany: With over 30 years of expertise in malware analysis, G DATA conducts research and software development exclusively in Germany. The highest standards of data protection are paramount. In 2011, G DATA issued a “no backdoor” guarantee with the “IT Security Made in Germany” seal of trust from TeleTrust eV. G DATA offers a portfolio from anti-virus and endpoint protection to penetration tests and incident response to forensic analyzes, security status checks and cyber awareness training to defend companies effectively. New technologies such as DeepRay use artificial intelligence to protect against malware. Service and support are part of the G DATA campus in Bochum. G DATA solutions are available in 90 countries and have received numerous awards.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more