Support

support@partek.ca

Contact

(403) 488-3333

Support

support@partek.ca

what to do if i’ve been hacked?
Cyber Incident Response Services

Is your business experiencing a cyber-attack or ransomware?

Get immediate help from Partek's incident response service.

How do I know if I've been hacked?

If you’re locked out of your systems, seeing ransom demands, or suspect unauthorized access, you are experiencing an active cyberattack.
Common signs include:

  • Ransomware messages on your screen

  • Sudden system lockouts or file encryption

  • Antivirus alerts or disabled security tools

  • Unrecognized logins or user activity

If you suspect your business has been hacked, take these steps immediately:

  1. Disconnect affected systems from the internet to prevent further spread.

  2. Do not attempt to “fix it” yourself — you could inadvertently destroy valuable forensic evidence.

  3. Preserve logs and activity records (firewall, server, endpoint).

  4. Contact Partek immediately. Our team will triage the incident, help you assess the scope of the breach, and guide you through the next steps.

Yes. Ransomware response is one of our core specialties.

We can contain and neutralize the malware, determine the entry point and method of attack, evaluate data recovery options (using backups or decryption, where possible),  help you avoid paying the ransom through safe recovery techniques, and provide post-incident hardening to reduce the risk of future attacks.

We’ve helped businesses of all sizes recover quickly and safely from ransomware events.

No. Paying the ransom is not recommended by cybersecurity professionals or law enforcement.

There’s no guarantee the hackers will decrypt your files or unlock your systems. Paying a ransom makes you more likely to become a repeat target as you’ll be seen as “willing to pay.”

Recovery time can vary significantly depending on the nature of the attack, the systems affected, whether backups are available.

In most cases, triage and threat containment begin within hours of contacting our team. For new clients or complex attacks, full system recovery may take longer, especially if backups are missing, systems need to be rebuilt, or data has been encrypted.

Partek works as quickly and thoroughly as possible to restore your operations while ensuring the root cause is addressed and future risk is minimized.

Yes. After incident response, we offer our Managed Threat Detection and Response service, which includes:

  • 24/7 threat detection and response

  • Endpoint and network monitoring

  • Patch management and vulnerability scanning

  • Staff training and phishing simulations

  • Security audits and hardening

This proactive approach turns a one-time incident into a long-term cybersecurity upgrade.

It depends on your policy. Most cyber liability insurance policies cover breach response costs, Legal expenses, Data recovery, Business interruption, and Ransom payments (in some cases).

We will help you gather the documentation needed to support your insurance claim, and can work directly with your insurer’s incident response team if necessary.

how to respond to a cyber attack

We respond fast, contain the threat, recover your business, and keep it protected.

Partek provides real-time incident response that restores your operations quickly while preventing further damage or data loss for your business.

When your business is under attack, every second counts. Partek’s Cyber Incident Response Team is your first line of defense — responding rapidly to identify, contain, and eliminate active threats against your organization. 

i got hacked who do i call

Get out of the Danger Zone, Fast.

Partek's incident response team will identify and eliminate active threats.

After immediate recovery, our team remains on alert to detect and respond to any lingering or related threats. You’ll also have the option to transition into our Managed Detection and Threat Response service, offering long-term protection, proactive threat hunting, and continuous security improvement.

Every Second Counts

It is critical that response to the initial indicator of compromise and full threat mitigation be as brief as possible.

Monitor and Defend

Once the threat is removed, we monitor your environment 24/7 for 45 days to ensure no residual or recurring threats emerge.

Incident Response Plan

Should the threat return or a related threat emerge, we will be there ready to respond. Around-the-clock proactive threat detection and response.

how to remove ransomware

Report a Cyber Incident:

Fill out the form or call us right away. We’ll walk you through your next steps and begin neutralizing the threat—fast.

Name(Required)
Eg. Locked out of systems, Ransomware message, Unusual login activity, Files encrypted or missing, Suspicious emails or phishing, Antivirus alert or system behaving strangely, etc.
Date and time.
Eg. disconnected devices, contacted IT, rebooted systems, etc.
Are you currently able to access any systems or backups?(Required)
Do you have internal IT support?(Required)