{"id":2436,"date":"2021-06-18T09:48:55","date_gmt":"2021-06-18T00:48:55","guid":{"rendered":"https:\/\/cyberenso.jp\/?page_id=2436"},"modified":"2021-08-19T09:25:47","modified_gmt":"2021-08-19T00:25:47","slug":"services","status":"publish","type":"page","link":"https:\/\/cyberenso.jp\/en\/services\/","title":{"rendered":"Services"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2436\" class=\"elementor elementor-2436\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1985b63 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1985b63\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ba90a5d\" data-id=\"ba90a5d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5dd63bf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5dd63bf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-0c134dd\" data-id=\"0c134dd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e35e28 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"4e35e28\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-xl\">SERVICES<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0d62603 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0d62603\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-fb3bab4\" data-id=\"fb3bab4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cfce40e elementor-align-center elementor-widget elementor-widget-button\" data-id=\"cfce40e\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberenso.jp\/en\/services\/incident-response-retainer\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon elementor-align-icon-left\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-hand-rock\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t<span class=\"elementor-button-text\">INCIDENT RESPONSE RETAINER<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-627b84a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"627b84a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-ca1740e\" data-id=\"ca1740e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-27eb4eb elementor-widget elementor-widget-heading\" data-id=\"27eb4eb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-medium\"><a href=\"https:\/\/cyberenso.jp\/en\/services\/ransomware-assessment\/\">RANSOMWARE ASSESSMENT<\/a><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-ce4419f\" data-id=\"ce4419f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8041852 elementor-widget elementor-widget-heading\" data-id=\"8041852\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-medium\"><a href=\"https:\/\/cyberenso.jp\/en\/services\/ransomware-incident-response\/\">RANSOMWARE INCIDENT RESPONSE<\/a><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-bba0c13\" data-id=\"bba0c13\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-917477b elementor-widget elementor-widget-heading\" data-id=\"917477b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-medium\"><a href=\"https:\/\/cyberenso.jp\/en\/services\/extortion-negotiations\/\">EXTORTION NEGOTIATIONS<\/a><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-e0f53a4\" data-id=\"e0f53a4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0b0bd2d elementor-widget elementor-widget-heading\" data-id=\"0b0bd2d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-medium\"><a href=\"https:\/\/cyberenso.jp\/en\/services\/settlement-decryption-support\/\">SETTLEMENT & DECRYPTION SUPPORT<\/a><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-e046aa9\" data-id=\"e046aa9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7690e80 elementor-widget elementor-widget-heading\" data-id=\"7690e80\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-medium\"><a href=\"https:\/\/cyberenso.jp\/en\/services\/ransomware-crypto-forensics\/\">RANSOMWARE CRYPTO FORENSICS<\/a><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-16be402 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"16be402\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9b07ca6\" data-id=\"9b07ca6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2ee999d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2ee999d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-310ef80\" data-id=\"310ef80\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7ab25cd elementor-widget elementor-widget-text-editor\" data-id=\"7ab25cd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p style=\"text-align: left;\">At Nihon Cyber Defence (NCD) we see the impact that cyber-attacks and in particular ransomware attacks can have. Whilst it has been major ransomware attacks that have dominated the headlines, the reality is that an enormous range of organisations are being impacted.<\/p><p style=\"text-align: left;\">This increase in the number and sophistication of attacks has been driven by Ransomware as a Service (RaaS), that has made sophisticated cyber tools available to a growing range of criminal groups.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-19bd2b2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"19bd2b2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-6c8d41d\" data-id=\"6c8d41d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-11e4f41 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"11e4f41\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Dealing with a major cyber incident<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5bada66 elementor-widget elementor-widget-text-editor\" data-id=\"5bada66\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p style=\"text-align: left;\"><span style=\"color: #444444;\">For an organisation\u2019s senior management, a ransomware attack is a major test of leadership. At NCD we believe that is important that senior managers, who are often under immense pressure, are supported through an incident. We have therefore &#8211; at the suggestion of several organisations that we have helped &#8211; are launching a cyber security advice service.<\/span><\/p><p><span style=\"color: #444444;\">The key elements of this service are that it is:<\/span><\/p><ul><li><strong><span style=\"color: #aa1736;\">Confidential<\/span><\/strong><\/li><li><strong><span style=\"color: #aa1736;\">Cost effective<\/span><\/strong><\/li><li><span style=\"color: #444444;\">Provides access to world-class <strong><span style=\"color: #aa1736;\">cyber security experts<\/span><\/strong><\/span><\/li><li><span style=\"color: #444444;\">For anyone in a <strong><span style=\"color: #aa1736;\">leadership<\/span><\/strong> position<\/span><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0db46b elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"b0db46b\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Purpose<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a998716 elementor-widget elementor-widget-text-editor\" data-id=\"a998716\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p style=\"text-align: center;\">The sole purpose of the NCD Advice Service is to help you recover from a Cyber Attack<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4efe6ee elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"4efe6ee\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Process<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94d9899 elementor-widget elementor-widget-text-editor\" data-id=\"94d9899\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"color: #444444;\">The way that this service works is:<\/span><\/p><ul><li><span style=\"color: #444444;\">Companies that believe that they may have become the victim of a cyber-attack, <strong><span style=\"color: #aa1736;\">contact<\/span><\/strong> NCD through our online portal (please do not use an email address that may have been compromised in the attack).<\/span><\/li><li><span style=\"color: #444444;\">A Non-Disclosure Agreement (NDA) is quickly put in place to ensure complete <strong><span style=\"color: #aa1736;\">confidentiality.<\/span><\/strong><\/span><\/li><li><span style=\"color: #444444;\">After an initial discussion with a native Japanese speaker, a secure <span style=\"color: #aa1736;\"><strong>video conferencing call<\/strong><\/span> will be set up between the company\u2019s management and world-class cyber security experts who have dealt with many hundreds of cyber security incidents. This call can be in English or with Japanese translation.<\/span><\/li><li><span style=\"color: #444444;\">During the call senior managers CEO\u2019s, CIOs, CFO\u2019s, CISO\u2019s or anyone else who finds themselves in a cyber incident management leadership role will have the opportunity to ask questions of these experts. These can be general questions around best and poor practice or specific technical <span style=\"color: #aa1736;\"><strong>questions.<\/strong><\/span><\/span><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24cce54 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"24cce54\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Asking the right questions<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30d962a elementor-widget elementor-widget-text-editor\" data-id=\"30d962a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"color: #444444;\">For senior managers who do not have a technical background we will equip you with the questions to ask of your Incident Response team. They could include:<\/span><\/p><ul><li><span style=\"color: #444444;\"><strong><span style=\"color: #aa1736;\">Technical Understanding<\/span><\/strong> &#8211; How did the incident happen? Has the access and attack vector been identified and closed? Is the attacker off the network or still there? Is there still a risk of further attack<\/span><\/li><li><span style=\"color: #444444;\"><span style=\"color: #aa1736;\"><strong>Mitigation<\/strong> <\/span>&#8211; What is the damage? What data has been affected or exfiltrated. How do we deal and mitigate this?<\/span><\/li><li><span style=\"color: #444444;\"><span style=\"color: #aa1736;\"><strong>Attribution and Investigation<\/strong><\/span> &#8211; Who was behind the attack? Why was the victim targeted? Is there an option to pay? Will we negotiate to identify the data exfoliated or to delay exposure? Do we know where the exposure will be \u2026 can we disrupt this? Can we recover the encrypted data? Should you involve law enforcement?<\/span><\/li><li><span style=\"color: #444444;\"><span style=\"color: #aa1736;\"><strong>Regulatory<\/strong><\/span>&#8211; What action is required from the data protection authorities or financial regulatory authorities?<\/span><\/li><li><span style=\"color: #444444;\"><span style=\"color: #aa1736;\"><strong>Comms<\/strong><\/span> &#8211; What is the internal and external Comms plan? Will this be protective or reactive (pending exposure)? How will we inform affected data subjects?<\/span><\/li><li><span style=\"color: #444444;\"><span style=\"color: #aa1736;\"><strong>Resilience<\/strong><\/span> &#8211; What is the plan to rebuild our network securely and how can we re-establish customer confidence and commercial reputation?<\/span><\/li><li><span style=\"color: #444444;\"><span style=\"color: #aa1736;\"><strong>Governance<\/strong><\/span> \u2013 What advice and guidance should be made available to the Board during an incident? How should the Incident be managed?<\/span><\/li><li><span style=\"color: #444444;\"><strong><span style=\"color: #aa1736;\">Support<\/span><\/strong> \u2013What external support do you require? As importantly, what support do we not require? How do we manage the expense of this support?<\/span><\/li><li><span style=\"color: #444444;\"><span style=\"color: #aa1736;\"><strong>Engagement<\/strong> <\/span>with the hostile actors. Should we engage? What are the risks associated with paying the ransom? How should engagement be taken forward?<\/span><\/li><\/ul><p><span style=\"color: #444444;\">Whilst this is designed to be a one-off service, many of our clients have found our experts\u2019 advice to be invaluable and ask us to remain engaged acting as a critical friend or to provide specialist technical services through the attack. <\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-867c4a1 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"867c4a1\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Other services<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a4dd1c elementor-widget elementor-widget-text-editor\" data-id=\"9a4dd1c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<span style=\"color: #444444;\">This service is in addition to our existing incident management response consultancy framework which covers:<\/span>\n<ul>\n \t<li><span style=\"color: #444444;\"><strong><span style=\"color: #AA1736;\">Preparation<\/span><\/strong>&#8211; boards awareness, incident planning and exercising\u00a0<\/span><\/li>\n \t<li><span style=\"color: #444444;\"><strong><span style=\"color: #AA1736;\">Monitoring <\/span><\/strong>&#8211; developing the deployment of the technical solutions pre and post in a cyber incident<\/span><\/li>\n<\/ul>\n<span style=\"color: #444444;\">We also provide a highly confidential service for organisations who believe that they may have been the victims of an attack involving an insider.<\/span>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-36310c14 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"36310c14\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-52db5aec\" data-id=\"52db5aec\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bd8122c elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"bd8122c\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Consultants<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-086160d elementor-widget elementor-widget-text-editor\" data-id=\"086160d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Our customers tell us that, having won the work, the major consulting companies use primarily junior staff to carry out the work. At NCD we only use consultants with many decades of experience.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>SERVICES INCIDENT RESPONSE RETAINER RANSOMWARE ASSESSMENT RANSOMWARE INCIDENT RESPONSE EXTORTION NEGOTIATIONS SETTLEMENT &#038; DECRYPTION SUPPORT RANSOMWARE CRYPTO FORENSICS At Nihon Cyber Defence (NCD) we see the impact that cyber-attacks and in particular ransomware attacks can have. Whilst it has been major ransomware attacks that have dominated the headlines, the reality is that an enormous range of organisations are being impacted.<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2436","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/2436"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=2436"}],"version-history":[{"count":318,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/2436\/revisions"}],"predecessor-version":[{"id":5267,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/2436\/revisions\/5267"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=2436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}