LCM Provided Cybersecurity Services for Pharmaceutical Client
Client:
Pharmaceutical company in Ontario, Canada
Challenge:
A pharmaceutical company approached LCM Security Inc. because their credentials were compromised, allowing access to critical systems and processes. The client was not sure how the hacker gained access to their systems. The pharmaceutical company wanted to find the source of the compromise and remediate it to ensure there would be no future issues.
Solution:
LCM started with implementing security measures that stopped any future compromise of the network. This was followed by a full CIS Assessment of the client's environment to understand their infrastructure's security gaps and risks. LCM provided the client with a Report of Findings and a budgeted Roadmap with a plan to remediate all gaps.
LCM is now working with the client to remediate all the gaps. A Governance Model has been put in place so that the client will be reassessed annually and can continuously improve their Security Posture.
LCM is providing the following services to the pharmaceutical company:
Professional: LCM’s professional services team evaluated the client’s network segmentation based on the sensitivity of data, regardless of if it was in the cloud or on-premises. LCM recommended and implemented a new firewall structure.
Managed: LCM provides Managed SIEM and Vulnerability Management.
Consulting: CIS Assessment, Policy Development, and Incident Response Plans.
Outcomes:
The client has adopted a CIS Security Posture and partnered with LCM to fulfill critical security roles required by CIS. This allows the client to mitigate risk in an expedited fashion.
The client continues to work with LCM to improve their Security Posture and make appropriate, budgeted spends on security.
Contact LCM today to solve your cybersecurity challenges.
LCM Security Inc. was founded in 2001 solely to provide advanced network security solutions that enable organizations to better leverage and control their costs associated with the acquisition and management of Security Infrastructures.