Get immediate help for cyber attacks with our new Incident Response services LEARN MORE >
We’re a selected team of skilled cybersecurity professionals who work as an extension of your IT staff, as well as best-in-class technology to add an additional layer of protection to your organization.
View our Managed ServicesHolistic risk assessment for your existing security program.
Get recommendations for your existing SaaS applications.
Execute on-site tabletop IR tests with IR process improvements.
Protect Your Digital Assets with Dark Web Monitoring Services
Our badged, US-based cybersecurity analysts provide 24x7x365 monitoring to mitigate cyber threats.
Ensure your business stays secure and compliant with continuous monitoring, detailed risk assessments and expert-led problem resolution.
Simplify complex configurations while ensuring your Microsoft environment is optimized, secured and protected.
Get holistic protection with our managed XDR services.
Managed endpoint detection and response service that continually monitors and responds.
Extend your mobile security beyond what your OS/MDM provide -- includes 24/7 threat monitoring, real-time response and seamless integration.
Unlock the power of Managed SIEM solutions and elevate your cyber defenses.
Run routine attempts to pierce your cyber defenses and check for vulnerabilities.
Our comprehensive outsourced cybersecurity program leverages advanced technology and expert professionals to enhance your security without the need for in-house capabilities.
We collaborate with best in the business to ensure our customers receive the highest levels of care and support. These trusted relationships allow us to better serve and educate our customers.
Regional Partner of the Year Award
Partner of the Year Award
With an abundance of solutions and providers, the task of choosing the right option is critical and can sometimes be overwhelming.
"Thanks to Inversion6, we now have an established protocol and response procedure whenever incidents are detected. Now, we are able to act immediately to prevent a security event from becoming a larger incident."
Read Full StoryOur experts are thought leaders in the cybersecurity space. From blogs to publications and webinars, check out these resources to learn more about what’s trending in our industry and how you can stay ahead.
Why Cybersecurity Should Be Driving Your Enterprise Risk Management Strategy
By Christopher Prewitt
Read ArticleCISO Craig Burland’s latest byline in Cyber Defense Magazine discusses the importance of accountability in cybersecurity.
View StoryWhen an insider threat strikes, every second counts
Of all the potential cyberattacks businesses will face—ransomware attacks create some of the highest levels of anxiety. There’s just something extra alarming about discovering all your data has been encrypted and finding yourself dead in the water holding a ransom note.
In the cybersecurity world, some of the most damaging threats we see often start from within. Unlike external attacks, they are launched by people you know; often a disgruntled employee who already has access to your systems and data.
Recently, this story became a reality for a major healthcare organization who found themselves racing against the clock to neutralize an act of sabotage. The incident—which was handled by our current Director of Incident Response, Tyler Hudak—demonstrated how urgent, intelligent response can stop a crisis from turning into a full-blown catastrophe.
The Situation
In this case, the malicious insider was an IT employee who planted a “logic bomb” into several critical systems. This malicious code was designed to wipe database tables from key servers, effectively sabotaging business-critical operations.
The employee set the logic bomb to go off about a week after they had been terminated, and the malware worked exactly as intended. Database tables disappeared from vital servers, disrupting operations and triggering a full-blown cybersecurity emergency.
Still reeling from the damage, the organization feared there were additional bombs elsewhere and suspected backdoors may have been left in place to allow the attacker to return.
Rapid Response
When logic bomb malware is involved, every second counts. Tyler and his team jumped on the case, using their tools, knowledge and speed to get the job done.
Once engaged, Tyler’s response strategy followed three focused steps:
The Results
The response to this incident was a success on several levels:
The Big Takeaway
Insider threats rarely come with warning signs. When sabotage hits, speed and clarity matter. And with the right team, tools and approach, even the most dangerous situations can be resolved.
Learn More
Don’t let insider threats take you down. Visit our Incident Response page to learn how Inversion6 can help you stay protected.