COMPROMISE ASSESSMENT

Identify
hacker’s footprint

What is Compromise Assessment?

Compromise assessment is meant to answer whether the network or systems are compromised. Through identification of footprints left by attackers, suspicious indicators in the network as well as abnormal usage computer resource, all could lead to the discovery of a potential compromise within your organization.

Such activities usually involve some degree of forensic investigation and analysis in order to detect anomalies within network and endpoints. Activities that may indicate the system is compromised includes but not limited to:

  • Suspicious lateral movements in the network

  • Escalation of user privileges

  • Abnormal amount of network traffic

  • Anti-virus configuration being tampered

  • Unusual files and/or folders in protected directories

Do I Need a Compromise Assessment?

While Penetration Testing and Vulnerability Assessment allows you to understand the security loopholes within the organization, it does not answer the question of whether your system has been and is in the process of being hacked.

Compromise assessment done by an accredited professional service provider can effectively assist your company to identify if any of your assets are compromised.

If you suspect that your system may be compromised due to a variety of unexplainable reasons, it is recommended that you reach out to a professional service provider for a compromise assessment.

How LGMS Does It Differently Than Others?

Here in LGMS, we specialize in performing a comprehensive assessment on your endpoint via digital forensic investigation methods. An attack usually starts with a single endpoint and ends on another. We believe that if these endpoints are thoroughly analysed in addition to building the chronology of the incident, the root cause of an attack can be identified. This essentially allows us provide recommendations in moving forward to our client so that they can successfully contain, eradicate, and prevent similar incidents from reoccurring.

Our Journey

Dive into LGMS’ journey in cyber security.

Has MySejahtera helped curb Covid-19?
The original article “Has MySejahtera helped curb Covid-19?” was published by K. Kathirg...
活力加油站 (Living Delight) -网络安全成隐忧?
完整视频”网络安全成隐忧?”来自 活力加油站 新冠肺炎(COVID19)疫情期间, 居家办公已逐渐成为常态。然而,这趋势背后却隐藏着网路安全的隐忧。 大马电台 八度空间 (8TV) 活力加油站 采访了...
The original article was published by SHIVANI SUPRAMANI at The Sun Daily. Cost and functionality the main factors considered when buying device that is both a work tool and status symbol PETALING JAYA: It is inconceivable that anyone would go without a smartphone today. Statistics show that there are an estimated 30.41 million smartphone users in […]