
Attack Response
Are you under attack?
We can help you stop an ongoing cyber attack, contain the compromise, restore system functionality, and recover data.
Follow these instructions:
- Find a device that has reasonably not been affected by the attack, and install the KeyBase software, creating an account;
- Contact us by creating a chat with our letsguard_it account.
Through KeyBase, we can communicate confidentially (end-to-end encrypted) to obtain the information needed for a preliminary analysis and provide you with a quote for the intervention.