What our clients are saying about us Testimonials
Community health center was experiencing chronic connectivity issues impacting their ability to provide critical health services to underserved patients.
After multiple I.T. vendors were brought in to resolve on going connectivity issues, CEM was brought in to resolve the issues once and for all. CEM worked with the carrier to identify an issue on one of the carrier’s routers. The carrier was able to fix the router issue and the client issue was resolved.
CEM was able to fix the issue through a collaborative and persistent approach with the carrier.
Issue was resolved.
The client is on CEM’s managed services which monitors connectivity 24 x 7 x 365 which alerts CEM’s network operation center (NOC) of connectivity issues when they occur allowing the NOC to resolve the issue before the client’s operations are impacted. If there is an area wide outage with the carrier, CEM implements the client’s business continuity plan to ensure that the client can continue to serve patients.
Backend Malware attack on the virtual host servers which encrypted servers.
CEM’s Network Operations Center, through remote monitoring (RMM), identified a cyber-attack on the virtual host servers. Immediately they isolated the virtual host servers to prevent the attack from spreading to other servers on the client’s network. The malware entry point was identified as a mobile device connected to an internal workstation where a phishing email from an outside source was opened. Because of early detection, secure client files were not breached.
Once the issue was triaged, CEM deployed Security and Event Management (SIEM) technology through our Security Operations Center (SOC) to detect and defend future attacks. In addition, we ran a Security Risk Assessment to identify additional vulnerabilities that need to be remediated. Mobile Device Management (MDM) was also deployed on all mobile devices and policies and procedures were updated regarding mobile device use on the organization’s wireless network.
Breach was stopped before any data was comprised.
On a continual basis, security scans and our Detect and Defend solution have been implemented. Administrative policies and procedures have been updated to include cybersecurity awareness training throughout the organization and we are working with organizational leadership to create an organizational culture of cybersecurity awareness.