Mitigate Your Maritime
Cyber Security Risks
SINCE 1999 WE HAVE HELPED OVER 10000 CLIENTS RECOVER THEIR DATA
Unmanaged endpoint protection (antivirus) & Firewall Human oversight is required for effective defense
No Cloud Backup, lack of Disaster Recovery Plan & Incident Response Plan & Runbooks No Anti-ransomware / Big actual downtime
No Active Directory present in many instances / lack of Audit trails and system logging
Absence of Logging for third party providers with system access
Unpatched systems, outdated Operating Systems and non-verified Third-Party applications
Lack of network segmentation and MFA as per IMO/NIST Guiding principles
Inadequate personnel cybersecurity training and lack of Cyber Insurance as per IMO/NIST Guiding principles
Lack of Risk Assessment and monitoring as per IMO/NIST Guiding principles
Hackers have Access to Financial Statements Ransom Demands is adjusted to company size
• No Cloud Backups
• No Disaster Recovery Planning
Multiple hacker groups may perform a cyber attack at the same time
• 2 months-long unnoticed APTs (Advanced Persistent Threats)
• Encryption took place after corrupting the offline backup files
• Attacker had root access with ability to disable defense mechanisms
IT Admins and the central management often perform mistakes during the process of a cyber attack that may render their data being corrupt forever, even after paying the hacker
Compromise SCAM (BEC SCAM)
Endpoint protection (EDR)
Comodo Advanced Endpoint protection offers an EDR solution with auto-containment patent pending technology that implements Zer-Trust policy
Cloud Managed Backup & Disaster Recovery
Acronis Award wining Ransomware-proof Automated Backup & Disaster Recovery to Cloud along with Disaster Recover Planning
Firewall Installation and continuous monitoring
24/7/365 Firewall monitoring service.
Extra services include Breach Simulation, Continuous Network Vulnerability Assessment with automated tools
Security Operations Center (SOC)
24/7/365 security monitoring and remediation from human experts. We don’t only observe, we take action
Live Digital Forensics
Using Advanced Digital Forensics tools our team perform real time digital forensics and investigate
Cyber Insurance
Tictac Cyber Security is the first MSSP provider in Greece that offers a special insurance coverage on top of its services
Cyber Security Awareness Training
Cyber Security is about People, Tools and Processes. We train the personnel to become Human Firewalls
What Does Ransomware Cost Greek Maritime Companies?
Since you reached our website you may be experiencing the following problems or have the questions below:
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged.
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged.
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged.
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged.
How We Can Help
with Ransomware Decryption and do the Ransomware Negotiation
If you have a ransomware incident or believe you are under attack then call us immediately for assistance
via our emergency line +30 21 1234 4511, chat or contact form.