pic

Security

There are several misconceptions about security in IT. The first is that you can add it in later. The second is that it’s someone else’s problem

EMAIL

One of the easiest ways to get a malicious program in to your targets systems is to simply send it to them. Having protection on the local machine is your last defence. You need to be able to intercept or block that attachment before anyone can click on it and run it.

FIREWALL

When you talk about network security the first device that springs to mind is a big trusty firewall. Nothing provides a stronger feeling of safety than a dedicated piece of hardware on your networks perimiter. When was the last time your updated it? Is the worry of a complete network outage putting you off even the smallest of system updates in case all the rules are lost?

SERVER

It’s not just viruses, trojans and malware you need to worry about. Do you have intrusion detection and prevention systems in place? Are you running audits of successsful and unsuccessful login attempts? If your systems were compromised how would you know? Would you be able to respond to an attempt to encypt your files or would you have to spend days restoring systems and files whilst taking the hit on lost work?

ENCRYPTION

What could be worse than finding out that your netowrk defences have been breached and data has been stolen. Feeling sick yet? By encrypting your data you can make sure that it is not ‘lost’ even if it has been copied. Using encryption can be an ultimate last line defense keeping your cilents safe and your reputation as a zero breach company.

SECURITY

Having a solid security strategy is vital for the modern business. We implement ‘Security in Depth’ as our focus but each deployment is customised to each clients needs. Have a look at the 8 sections your security strategy needs to take into account.

WEB

Data flows through your network and the web is what it travels via. With all virus downloads coming from outside your network are you sure that malicious URLs are being blocked or are you relying on your firewall to detect and block attachments? By using web filtering you can block malicous websites before a user gets to it. Not only that but you can block entire categories of content like gambling or social media with ease.

ENDPOINT

Enpoints, there are so many and they are every where. In order to make sure they are all protected you need all of your devices to be protected and managed on one central system allowing for a complete view of connected devices.

MOBILE

Mobile devices are beginning to outnumber people. In fact the last survey we read determined that the average person carries 2.4 devices each. One is always a smartphone. What access points do you allow your smartphones to connect to? Are they trusted hotspots only or can they connect to any potentially compromised wifi network?

WIRELESS

Do you look at the wireless SSID of an access point before you connect to it? Is it one of yours or a public access point? Perhaps its a hackers waiting to gether login details when you connect to it. Perhaps it looks like your access point but its someone elses added to your network without your knowledge so they can sit in the car outside whilst stealing all your data.

pic

Can’t remember when your last security audit occurred?

ARRANGE A CONSULTATION