12/15/2016 3:53pm – Amidst the holiday hustle and year-end deadlines, an unsuspecting user invited a Grinch-like Ransomware attack onto a manufacturer’s Terminal Server, which hosted mission-critical databases for their product lines. The decision at hand was to pay the ransom or contact River Run to resume operations.
12/15/2016 3:59pm – River Run received an e-mail from the client informing us of the attack, which triggered a High Priority alert and Service Order to the client’s assigned Support Team Engineer.
12/15/2016 4:00pm – The Support Team Engineer reached out to the client’s IT contact to discuss the process to remediate the attack and restore the network back to health. The following tasks were immediately performed:
1. River Run deleted the user’s network profile that introduced the infection to the network.
2. We performed a file restoration on the R-Backup Plus system to a point in time prior to the network being infected.
3. We copied the user’s old uninfected profile from the Backup Plus system to their desktop.
4. We ran several security scans to ensure the network was clean, and informed the client.
The following morning, the same Support Team Engineer reached out to the client to be sure the issue had been resolved.
River Run made the holidays happier for this manufacturer by saving the client money, data and business continuity. No ransom was paid.
If money, data security and business continuity are important to you, contact River Run for peace of mind. Ask for more information about R-Backup, R-Backup Plus and our 4-Part Support Process. We will keep your holidays (and every day) bright!