Assess Your Resistance to Cyberattacks Such as Ransomware Attacks
Ransomware Response Support Service – Ransomware Diagnosis –
We visualize your response situation against ransomware and other malware infections and submit a report. You can then consider future security measure enhancements through this diagnosis of whether you have any traces of attacks or vulnerabilities in your settings that make it easier for attackers to target you.
Ransomware Response Support Service
Categorizing the response processes for ransomware attacks as “preparation,” “visualization,” and “operation,” we provide the required measures.
In recent years, ransomware attacks have proliferated and it is essential for companies seeking to enhance security to understand attack methods and the latest trends. However, many companies have a shortage of human resources with the relevant security expertise and are unable to take the appropriate measures.
The Ransomware Response Support Service consists of three menus, Ransomware Advance Preparation Support to organize ransomware response procedures, Ransomware Diagnosis to identify attacks and deficiencies in operation, and Ransomware Monitoring to detect attacks.
Service Overview
Ransomware Diagnosis is used on Microsoft Active Directory and various devices which can be easy targets for ransomware. With the additional viewpoint of Bluetooth, which is used in attacks, to diagnose whether there are traces of attacks or deficiencies in settings that could cause vulnerabilities, the aim is to minimize the damage caused by attacks.
- Check for Traces of Attacks
-
We check whether there are traces of attacks in your environment at present. In the case that such traces are confirmed, we conduct further investigation.※
- Understand Vulnerable Settings and Operation Situation
-
We grasp whether there are Remote Desktop Protocol (RDP) settings that can be used for attacks and the operation situation of Active Directory which can be targeted by attackers.
- Consider Security Measure Enhancements
-
Based on the diagnosis results, you can consider security measure enhancements so as to not become infected by ransomware and other malware.
- A separate fee is required.
Service Benefits
- Understand Wide-Ranging Risks
-
Including Bluetooth attacks* in the elements for diagnosis helps to identify vulnerabilities and deficiencies in operation that are difficult to notice with a more general diagnosis.
- Obtain a Diagnosis Useful for Improving Operation
-
A diagnosis with recommended responses from consultants and engineers who have extensive experience in diagnosing cyberattacks is useful for improving your security operation going forward.
- Improve Security Operation Response Capabilities
-
The implementation results are useful in considering security measures in “how not to be infected by ransomware and other malware.” Your security response capabilities will therefore improve.
- Attempts to fraudulently log in at the beginning of a ransomware attack.
Service Flow
Week One
Investigation preparation
JBS provides the investigation tool and questionnaire.
Week Two
Obtain data
- Please fill out the questionnaire.
- In accordance with the instruction manual you receive, please implement the investigation tool on the subject servers and clients.(※2)
Week Three
Data handover
- Please submit the obtained data and questionnaire to JBS.
Week Four
Conduct investigation
- We conduct an investigation of the provided data.
- The investigation period will change depending on the number of devices that are subject to investigation.
Week Five
- We submit an assessment results report (Word file) and separate sheet (Excel file).
- 1 The investigation period may vary depending on your environment (number of devices subject to diagnosis).
- 2 You implement the investigation tool with administrator’s authority. It is necessary for you to allow connection from the investigation targets to JBS’s servers.
Target Product OS
- Client: Windows 10 or later
- Server: Windows Server 2016 or later (Net Framework 4.5.2 or later required)
- Related Tag