{"id":7303,"date":"2022-09-09T11:11:01","date_gmt":"2022-09-09T08:11:01","guid":{"rendered":"https:\/\/cyberone.bg\/?page_id=7303"},"modified":"2022-09-09T11:47:29","modified_gmt":"2022-09-09T08:47:29","slug":"data-breach-investigation","status":"publish","type":"page","link":"https:\/\/cyberone.bg\/en\/data-breach-investigation","title":{"rendered":"Data Breach Investigation"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"7303\" class=\"elementor elementor-7303 elementor-6406\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b50a57f elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"b50a57f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-21ced5e ot-flex-column-vertical\" data-id=\"21ced5e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cb9fbab elementor-widget elementor-widget-iheading\" data-id=\"cb9fbab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ When the worst happens you can count on us<\/span>\r\n\t        <h2 class=\"main-heading\">Data Breach Investigation<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1dff09 elementor-widget elementor-widget-text-editor\" data-id=\"f1dff09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>During a breach in your systems, it is important to act quickly to contain the threat and its risks, and to minimize the impact by getting to the root cause. However, ignoring obvious procedures can limit your ability to help legal or government authorities investigate and analyze the threat. Our digital forensics professionals will work closely with your company&#8217;s crisis communications team to provide the public and customers with up-to-date information on any personal information that may have been compromised, as well as information on the steps being taken to protecting customers against future incidents.<\/p><p>As the main steps of cyber incident investigation activities, our specialists will help you uncover any information related to the causes, facts and consequences of a cyber incident. At the end of each investigation, a full report is provided to the service, which includes all facts and circumstances, photographic material, recommendations, conclusions and analyses.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-914c0a3 ot-flex-column-vertical\" data-id=\"914c0a3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6cb3f1c elementor-widget elementor-widget-image\" data-id=\"6cb3f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"2000\" height=\"2000\" src=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Consulting-rafiki.png\" class=\"attachment-full size-full wp-image-6481\" alt=\"\" srcset=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Consulting-rafiki.png 2000w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Consulting-rafiki-300x300.png 300w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Consulting-rafiki-1024x1024.png 1024w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Consulting-rafiki-150x150.png 150w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Consulting-rafiki-768x768.png 768w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Consulting-rafiki-1536x1536.png 1536w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Consulting-rafiki-720x720.png 720w\" sizes=\"(max-width: 2000px) 100vw, 2000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8e8ecba elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"8e8ecba\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a6becac ot-flex-column-vertical\" data-id=\"a6becac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9001337 elementor-widget elementor-widget-iheading\" data-id=\"9001337\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Different types of incidents we can help you with<\/span>\r\n\t        <h2 class=\"main-heading\">Types of incidents<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8ad25e0 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"8ad25e0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-28f5237 ot-flex-column-vertical\" data-id=\"28f5237\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ff862bb elementor-section-full_width ot-layout_block elementor-section-height-default elementor-section-height-default\" data-id=\"ff862bb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-edfcf03 ot-flex-column-vertical\" data-id=\"edfcf03\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b05d174 elementor-widget elementor-widget-iiconbox2\" data-id=\"b05d174\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Malware, Ransomware and extortion<\/h5>\r\n\t            <p>No one wants to be held hostage, and there is nothing worse than having your business shut down by a cybercriminal who wants tens of thousands of dollars in cryptocurrency. If you are affected by ransomware, our team of experts will act quickly and efficiently to mitigate the threat, restore order to your IT infrastructure, and make every effort to recover your information so that you can continue to operate normally.\n\nCYBERONE has extensive experience with dozens of real ransomware attacks every year. We are here to protect you and help you recover. When you engage CYBERONE, our expert team will help you make critical business decisions. We will work quickly to restore your assets to normal, address your issues and help you avoid business and reputational damage.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c4d9ec2 ot-flex-column-vertical\" data-id=\"c4d9ec2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1f91903 elementor-widget elementor-widget-iiconbox2\" data-id=\"1f91903\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Compromised email server or mail account<\/h5>\r\n\t            <p>Corporate email accounts contain all kinds of sensitive data and are a priority target for cybercriminals. Whether they want to steal data, commit fraud, or have other malicious intent, compromising business email can be particularly damaging to your organization and reputation. When you engage CYBERONE to solve your IT problems, our experts work to quickly restore affected assets to normal, address vulnerabilities on your email server or account, and help you understand the full scope of the attack and affected assets, as well as the consequences. This analysis will help you make critical decisions that will protect your reputation and critical information.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2671122 elementor-section-full_width ot-layout_block elementor-section-height-default elementor-section-height-default\" data-id=\"2671122\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-62caebf ot-flex-column-vertical\" data-id=\"62caebf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-51ce322 elementor-widget elementor-widget-iiconbox2\" data-id=\"51ce322\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Online threats to business<\/h5>\r\n\t            <p>We excel where others fail when it comes to responding to advanced cyber threats affecting your business. If you are attacked by more experienced malicious actors, CYBERONE takes swift action to understand the nature of the threat and take proactive measures to mitigate the damage accordingly. As cybercriminals continue to innovate, attacks on web applications, e-commerce fraud, and credit card theft are becoming more common. CYBERONE experts can respond to even the most advanced attacks to prevent continued malicious activity and analyze causes, impact and consequences.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6d33c50 ot-flex-column-vertical\" data-id=\"6d33c50\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e4ef874 elementor-widget elementor-widget-iiconbox2\" data-id=\"e4ef874\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s2\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Insider threats from (former) employees<\/h5>\r\n\t            <p>Insider threats pose one of the biggest cybersecurity risks to your organization. They pose as trusted employees, reliable suppliers, and hard-working contractors who will use their privileged access to cause serious harm. Whether it's current or former employees and partners, the risk of malicious activity is equally high. We know how to investigate such cyber incidents and gather enough evidence and facts to claim your rights before the authorities and court. CYBERONE experts can work for you to mitigate the risk of malicious insider actions and gather sufficient facts and evidence about the potential theft of data, corporate secrets, intellectual property or other damages.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\/\/ When the worst happens you can count on us Data Breach Investigation During a breach in your systems, it is important to act quickly to contain the threat and its risks, and to minimize the impact by getting to the root cause. However, ignoring obvious procedures can limit your ability to help legal or [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7303","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7303","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=7303"}],"version-history":[{"count":8,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7303\/revisions"}],"predecessor-version":[{"id":7313,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7303\/revisions\/7313"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=7303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}