Mitigate Your Maritime
Cyber Security Risks

Ships are hacked too. It’s not a matter of IF,
it’s a matter of WHEN.
ISO & AWARDS
IN THE MEDIA

SINCE 1999 WE HAVE HELPED OVER 10000 CLIENTS RECOVER THEIR DATA

Disaster Recovery & Cyber Security Services for Maritime

Provided Services & SLAs
  • We guarantee your data availability in case of hardware/software failure or Cyber Attack
  • We guarantee your system restoration in less than 30 minutes with the Disaster Recovery Service
  • We provide Data Storage in Data Centers all over the world, depending on clients’ compliance
We Protect your Critical Data:
  • Anti-Ransomware Cloud Backup
  • Disaster recovery on the cloud
  • Local Backup if needed
  • Daily Backup monitoring
  • Disaster Recovery Testing

Backup & Disaster Recovery Services

We Protect your Critical Data:
  • We guarantee your data availability in case of hardware/software failure or Cyber Attack
  • We guarantee your system restoration in less than 30 minutes with the Disaster Recovery Service
  • We provide Data Storage in Data Centers all over the world, depending on clients’ compliance
We Protect your Critical Data:
  • Anti-Ransomware Cloud Backup
  • Disaster recovery on the cloud
  • Local Backup if needed
  • Daily Backup monitoring
  • Disaster Recovery Testing
Our experience in Greek Shipping Cyber-exposure revealed:
1

Unmanaged endpoint protection (antivirus) & Firewall Human oversight is required for effective defense

2

No Cloud Backup, lack of Disaster Recovery Plan & Incident Response Plan & Runbooks No Anti-ransomware / Big actual downtime

3

No Active Directory present in many instances / lack of Audit trails and system logging

4

Absence of Logging for third party providers with system access

5

Unpatched systems, outdated Operating Systems  and non-verified Third-Party applications

6

Lack of network segmentation and MFA as per IMO/NIST Guiding principles

7

Inadequate personnel cybersecurity training and lack of Cyber Insurance as per IMO/NIST Guiding principles

8

Lack of  Risk Assessment and monitoring as per IMO/NIST Guiding principles

30 Ransomware Attacks in Greek Maritime Companies
Targeted attacks in the Maritime Industry

Hackers have Access to Financial Statements Ransom Demands is adjusted to company size

Old Fashioned backup processes

• No Cloud Backups
• No Disaster Recovery Planning

Multiple ransomware encryption

Multiple hacker groups may perform a cyber attack at the same time

Computer Forensics identifies the following:

• 2 months-long unnoticed APTs (Advanced Persistent Threats)
• Encryption took place after corrupting the offline backup files
• Attacker had root access with ability to disable defense mechanisms

IT Admins

IT Admins and the central management often perform mistakes during the process of a cyber attack that may render their data being corrupt forever, even after paying the hacker

Numerous cases of Business Email

Compromise SCAM (BEC SCAM)

MSSP Model
1

Endpoint protection (EDR)
Comodo Advanced Endpoint protection offers an EDR solution with auto-containment patent pending technology that implements Zer-Trust policy

2

Cloud Managed Backup & Disaster Recovery
Acronis Award wining Ransomware-proof Automated Backup & Disaster Recovery to Cloud along with Disaster Recover Planning

3

Firewall Installation and continuous monitoring
24/7/365 Firewall monitoring service.
Extra services include Breach Simulation, Continuous Network Vulnerability Assessment with automated tools

4

Security Operations Center (SOC)
24/7/365 security monitoring and remediation from human experts. We don’t only observe, we take action

5

Live Digital Forensics
Using Advanced Digital Forensics tools our team perform real time digital forensics and investigate

6

Cyber Insurance
Tictac Cyber Security is the first MSSP provider in Greece that offers a special insurance coverage on top of its services

7

Cyber Security Awareness Training
Cyber Security is about People, Tools and Processes. We train the personnel to become Human Firewalls

What Does Ransomware Cost Greek Maritime Companies?

  • Your valuable files are lost
  • Your valuable files are lost
  • No communication with ships
  • Financial losses from day one
  • Legal implications from data leakage
  • Third-party exposure
  • No incident response mechanism in place = nightmare!
  • You cannot see the enemy without special tools

 

Contact us now

TESTIMONIALS
What our clients say about us
24/06/2022
TicTac,μια πολύ εξυπηρετική ομάδα με επαγγελματισμό και συνεχείς ενημερώσεις για την εξέλιξη της ανάκτησης των δεδομένων από σπασμένο USB. Κατάφεραν την ανάκτηση του 98% των αρχείων μας. Είμαστε πάρα πολύ ευχαριστημένοι! Προτείνουμε ανεπιφύλακτα TicTac!!
Adrian Bratty Kouyoufas
24/06/2022
On behalf of "Proteus Social Innovation & Development" we would like to thank TicTac Data Recovery that managed to recover our data from our destroyed external Hard Drive in which we had stored our work from various projects that it would be extremely time consuming to restore otherwise.
Dimitrios Kokkinis
24/06/2022
Hey ! I tried other companies that were scam but when i found Tictac they were professional from the beginning. Mike helped me understand how they work and they helped me recover from STOP Djvu Ransomware Incident. I want to thank this team because they were cheap when compared to other services provided in other European Countries and they worked on my computer for more than 4 days in order to recover the files and clean the system. Thank you Tic-Tac.gr and Mike for your for commitment and professionalism !!!
Łukasz R.
02/06/2022
My files were locked by malware and I was asked for ransom. The company TIC TAC undertook the negotiation with the hackers and the whole process required by my case and in less than 48 hours I had all my files back (26 years of work). The way they explained to me, the collaboration with the technicians I worked with for years and the overall support I had during the "hostage" and until today was so human that I think these people will be in my heart and in my prayers forever . Thank you for all!
ΠΑΡΙΣΗ ΔΕ.

FAQ

Since you reached our website you may be experiencing the following problems or have the questions below:

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged.

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged.

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged.

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged.

How We Can Help

with Ransomware Decryption and do the Ransomware Negotiation

If you have a ransomware incident or believe you are under attack then call us immediately for assistance
via our emergency line +30 21 1234 4511, chat or contact form.

Our team has managed to successfully decrypt thousands of cases.