Case Studies
Ransomware Defense at Waverly Borough Council


Council's in the Ransomware Bullseye
In 2021, UK Council's became the epicenter of a series of ransomware attacks the crippled many of the services offered to their citizens just as COVID-19 peaked. As multiple councils became the victims, the head of the NCSC (National Cyber Security Centre) warned that “most of the devastating ransomware attacks against UK targets” originated in Russia and that not enough organizations in the UK are adequately prepared to deal with the threat. Not wanting to become the next headline, Waverly's IT team began a search to upgrade their defenses.
Needs link added
Requirements
- >
Understand all the network devices and define where sensitive data was located
- >
Deploy within a limited budget, and operate under a small IT team
- >
Show specific ransomware defense policies and reports
- >
Automate 24/7 monitoring for ransomware attacks.
Achievements
- >
Accurately mapped all network resources and all identified “unknown” systems.
- >
Identified, categorized and labelled sensitive assets on the network.
- >
Enabled continual 24/7 monitoring that watches all network traffic, IT systems and endpoint systems for ransomware risks and threats.
- >
Deployed security policies and automated reporting that expanded the Council’s security framework to cover ransomware attacks.
“The first step was implementation – this could not have been easier. CyGlass is fully automated and being a fully hosted solution, is non-intrusive and of no risk to our data. We achieved initial traffic flow in 45 minutes. It took just a few days to learn our network, shining a light on many areas that were not easily visible. This helped us highlight and prioritize remediation work even with limited resources.”
HOWARD DENHART, SERVICE DESK SUPERVISOR
Waverley Borough Council
The Solution
Rapid Time to Value, Powerful Defense
NDaaS was a perfect fit for Waverley Borough Council. It met all of the project objectives including visibility of assets and risk on the network, network based threat detection, continual monitoring, and automated detection and response, but most importantly, it required no new hardware and no new headcount.

