To detect signs of preparation for hacker attack, signs of data compromise, to help assess the scope of damage and to find out which systems were attacked and how exactly it happened.
Process
Utilizes specialized proprietary forensic tools and unique data, checking key infrastructure nodes: domain controller, processing, payment gateways, etc. Reconstruction of infrastructure compromise chronology to prevent recurrence of incidents
Result
Description of the chronology of infrastructure compromise, detailed analysis of the attackers’ actions, recommendations for upgrading the infrastructure to prevent future attacks, and a report describing the main results of the audit
Get advice on identifying traces of compromise and signs of preparation for a hacker attack