Case Study: Cybersecurity Assessment Finds Malicious Files
Customise Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorised as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyse the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customised advertisements based on the pages you visited previously and to analyse the effectiveness of the ad campaigns.

No cookies to display.

Case Study

Cybersecurity Assessment and Remediation Removes Malicious Files and Reduces IT Risk

Services Provided
Technology Advisory, Technology and Cybersecurity Due Diligence
Industries Served
Packaging

According to Cybersecurity Ventures, more than 50% of cyberattacks are committed against small-to-mid-sized businesses.

The Challenge

During the due diligence process, a private equity firm discovered the target – a leader in the design and manufacture of packaging products and equipment for consumer and industrial applications – lacked cybersecurity insurance which was a requirement for the deal to proceed. TriVista was brought in to conduct a vulnerability scan of the target’s IT environment and assist in obtaining the necessary insurance. Following the successful acquisition, we continued cybersecurity enhancements and worked to consolidate infrastructure and applications.

Our Approach

As part of the cybersecurity assessment and insurance process, we:

  • Worked with third-party vendors and Managed Service Providers (MSPs) to ensure all had appropriate access to the client’s environment
  • Installed cybersecurity scanning agents on all servers and client computers
  • Initiated vulnerability scan to identify security threats
  • Took steps to remediate barriers to obtaining insurance
  • Worked with partners to secure cybersecurity insurance

After the transaction closed, we created a roadmap outlining future-state processes, procedures and policies. This included a consolidation of infrastructure and integration, as well as risk mitigation through additional cybersecurity enhancements.

The Results

Through the assessment of 50+ assets in the client environment, we identified 3 malicious or potentially malicious files. One of these files was determined to be a 3-year-old malicious document tied to the Emotet malware family – indicating the client may have been targeted by a sophisticated threat actor in the past.

All high and moderate IT risks were identified and actions were taken to remove malicious applications and files. Applications that required patching were noted and remediated by partnering with managed service providers.

Finally, systems from all divisions within the company were integrated including the network, email setup, user identity management system, and more.

To find out how TriVista can help you achieve similar outcomes, contact us today:

"*" indicates required fields

This field is for validation purposes and should be left unchanged.