Steps to Recovery
Don’t panic. We are here to do the best we can in assessing the situation and recovering your data
Disaster Procedure
Locate Intrusion
The Most important task is to identify the Intruder and resolve how the disaster occurred. Replacing a backup without full knowledge may repeat itself and possible endanger your backups
Assess Backups
Locate backups of your system and prep them for recovery.
Recover Data
Best solutions do not require backups, but the worst problems involve not having backups. We will attempt to recover the data in the same way it was before the attack
Legal Witness
In worst case scenarios, make sure you have the right team prepared for dealing with the fallout of a disaster.
Your Audit Team
Matt Potter - Cyber Security Analyst
Matt Potter is a cyber security expert with strong background as a systems analyst, administrator & trainer. He currently leads and manages the forensic and cyber security division of F5. Documentation, transparency and education are key values to his team, his goal is to bring our clients to a new level of understanding that helps build a secure digital network of prepared companies.
Get Expert Consulting