Midwest-Based Community Bank | Cybersecurity
The possibility for a ransomware attack exists—anywhere, anytime. What determines recovery? Readiness to respond immediately—and with the right steps.
This was the situation facing the bank when an attack brought its operations to a halt. The bank needed to mitigate the financial impact and maintain its reputation with customers, regulators, and other stakeholders. At the recommendation of a forensics firm, the bank called West Monroe. Just four days later, we had the bank back up and running.
workstations rebuilt across all 6 branches
physical and virtual servers decrypted in 2 locations
days to resume business on key systems after we began recovery work
In 2019, the bank was the victim of a DopplePaymer ransomware attack that rendered its IT systems and applications inoperable. The bank resorted to executing transactions manually. And without key systems, it was unable to fulfill critical daily, weekly, and month-end reporting obligations.
Like many organizations, the bank relied on a lean internal team and remote outsourcing vendors for IT support. Their IT staffing model was not built to support large-scale system failure and they needed expertise to respond quickly to this event and restore the systems that support revenue generation and regulatory compliance. So, bank leaders turned to us to help manage the crisis—and restore the IT assets needed to generate revenue and comply with regulations.
Our team was ready for the call. We sprung to action with an approach:
In just four days, our team:
Just six days after the attack and four days after engaging West Monroe, the bank was back to conducting business. This speed of recovery enabled the bank to continue meeting its regulatory reporting requirements—avoiding potential regulatory fines and mitigating financial and reputational risks.