Attack Response

Are you under attack?

We can help you stop an ongoing cyber attack, contain the compromise, restore system functionality, and recover data.

Follow these instructions:

  1. Find a device that has reasonably not been affected by the attack, and install the KeyBase software, creating an account;
  2. Contact us by creating a chat with our letsguard_it account.

Through KeyBase, we can communicate confidentially (end-to-end encrypted) to obtain the information needed for a preliminary analysis and provide you with a quote for the intervention.