EMERGENCY NUMBER

Cyberattack

For Immediate Assistance

Under attack?

Follow these 3 steps

cybersecurity expert sitting infront of a computer monitoring IT environment

1. Call us!

The first thing to do is call one of the numbers listed above so we can assign an Incident Manager to your team, establish what occurred and the extent of the intrusion, and quickly develop an action plan.

2. Don’t Touch Anything!

Treat your network as a crime scene. We recommend keeping everything as it is and make sure you disconnected your environment from the internet.

3. Secure Your Backups!

Disconnect your backups from the network, but ensure the backup system itself remains operational – do not turn it off.