Skip to content

Compromise Assessment

Recognising hacker attacks at an early stage

Detect and contain attacks with compromise assessments

If attackers gain unauthorised access to a company's IT infrastructure, they have usually not yet reached their goal. They are more interested in gaining access to the most sensitive data or compromising other systems and user accounts. The longer their activities remain undetected, the greater the ultimate damage.

With the help of a compromise assessment, you can uncover traces of hacker attacks and compromised IT systems at an early stage, initiate appropriate countermeasures promptly and thus put an end to any ongoing attacks. By efficiently closing identified security gaps, you also prevent them from being exploited again in the future.

  • Legal certainty
    A DSMS supports GDPR-compliant implementation and reduces the risk of fines and liability.
  • Transparency & control
    Clear processes and structures provide an overview of all data protection-relevant processes in the company.
  • Risk minimisation
    Data protection risks are identified at an early stage and systematically reduced.
  • Trust & image enhancement
    A functioning DSMS strengthens the trust of customers, partners and supervisory authorities.

What is a Compromise Assessment

A compromise assessment is one way of recognising compromised IT systems. For this purpose, scanners are used that search for so-called Indicators of Compromise (IoCs). These are traces left behind by attackers and their tools, even if they appear to have deleted them.

To detect IoCs, we use an extensive set of YARA and SIGMA rules. The scanners analyse your systems using digital forensic methods and deliver the results in the form of events. These are then grouped into cases, classified and evaluated by our experienced experts. You then receive an assessment of each alarm and the resulting recommendation for action.

Benefits of a compromise assessment

  • Early detection of hacker attacks
    You can reliably identify hacker activities and traces of attacks on the IT systems tested.
  • Increasing IT security
    A compromise assessment helps you to further improve your company's IT security.
  • Buildtrust with customers & business partners
    Compromise assessments show that IT security is a top priority for you.
  • Identification of Indicators of Compromise (IoC)
    Our experts recognise and evaluate indicators that a computer has been compromised.
  • Comprehensive recommendations for action
    Following the assessment, we will provide you with recommendations for suitable defence measures.
  • Guidance for investments
    Compromise assessments serve as an indication of the areas in which you are best advised to invest.
  • Protection against financial and reputational damage
    By carrying out regular compromise assessments, you can prevent future hacker attacks.
  • Focus on your business
    While our IT forensic experts are at work, your experts can continue to focus on your day-to-day business.
Compromise Assessment

Our approach

For an effective project, we support you during the 3 stages of our process model.

Procedure for a compromise assessment

1

Data collection

Collection of all evidence from log files, files, caches, hives (e.g. Windows Registry)

2

Identification

Application of algorithms, rules, threat intelligence, IOCs

3

Analysis

Evaluation and interpretation of the results