Cyber-crime dominates news channels. The more we rely on digital systems, the more crime moves from physical to virtual. We either sit back and wait for the inevitable compromise – email hack, or maybe worse – ransomware attack, or we take a proactive ‘safe as houses’ approach. We prefer the latter.
Over the last 22 years from 2001 to 2023, cyber-crime has claimed at least 6.5 million victims with an estimated loss of nearly $26 billion over the same period
33 Billion Accounts Breached in 2023*
Azure Premium P2
This additional Microsoft security license further increases the security around Microsoft & Office 365. It enables our security experts to create highly detailed and customer specific conditional access policies, that will automatically enforce security policies and pre-defined actions immediately upon detection of increased risk, for example, should abnormal or higher risk sign-ins be detected.
Endpoint AntiVirus provides a lightweight endpoint protection solution for laptops and PC’s. Unlike our Iglu solution. many modern AV solutions are cumbersome and severely reduce performance of the machine. Ours proactively monitors and deals with active threats, such as trojans and others endpoint viruses. Iglu endpoint protection further provides a DNS filter solution, enabling our security experts to implement ‘blocked’ and ‘permitted’ lists of sites that can/cannot be accessed, as well as making use of the standard, in-built content category blocking to reduce the number of inappropriate or compromised sites being accessed from company devices
Data & Email Backup
Secure online backups for e-mail, SharePoint, Teams. The backup retention policies are:
3 daily backups and retain for 30 days.
After 30 days, the system saves one of those three daily backups per user.
After 90 days, the system saves one weekly backup per user.
After one year, saves one monthly backup per user
EDR & SOC
Endpoint Detection Response (EDR) connects to our highly proactive and robust Managed SOC (Security Operations Centre) solution. The solution automatically searches for threats and proactively secures and attempts to remedy without human interaction. The solution aggregates all log files from a variety of your systems and endpoints and interrogates for signs of security breach – suspect detections are flagged to our helpdesk system, creating a support requirement for urgent remediation
Dark Web Monitoring
To further reduce the risk of cyber threats introduced through human (employee) error, we include a solution that monitors the dark web for leaked credentials related to your primary email domain and addresses.
Should a leaked credential be identified, a ticket is logged in our helpdesk system, and ensures that the user is urgently informed to proceed in changing credentials associated with the leaked details.
During our initial requirement gathering, we will run an indicative search and report on any potential leaked credentials.
Mimecast acts as both an email spam/virus filter, and a disaster recovery solution for Microsoft 365. Should Microsoft experience a mass outage, emails will still function via the Mimecast webmail portal. Emails (incoming and outgoing) are archived for up to 7 years in line with FCA compliance regulations
Our proactive vulnerability scanning tool, actively scans all machines for any known vulnerabilities that need to be addressed (unused or spurious software, security shortcomings, patch requirements etc). Once identified, the system automatically generates a service ticket in our helpdesk system, for our engineers to action and remedy.
Our VS tool, also scans the external IP of your office environment, including your website for any known threats, alerting our team to urgent remediation requirements.
Cyber Security Training
Companies often deliberate over the optimum way to ensure the risk that your employees represent to your cyber security is mitigated as best as possible.
Many cyber breaches initially gain access through employee and user error (via successful phishing attacks as an example), and the best way to mitigate this risk isn’t always clear. Until now.
Our security experts will implement and configure proactive cyber security training for your entire employee base, board and directors included. Each member of your team completes an initial security questionnaire, which informs and gears the subsequent and automated training to their specific areas of weakness.
These training courses are continually updated in line with the latest security trends.
We also proactively simulate phishing e-mail attacks. The results of these simulations provide invaluable data as to who clicked various links, who accessed the (unbeknown to them) simulation site, and who proceeds to full compromise (entering full security credentials). From this data, we then provide further training and simulated attacks until we can be sure the employee is compliant with the security levels required to protect your environment.
The use of a highly secure password management software tool avoids users arbitrarily storing their passwords on their smartphone, a document on their desktop or a slip of paper in their wallet. Our solution provides a secure encrypted area where employees store passwords. Our security experts can further disable the ability for users to save to web browsers which increases security and reduces the likelihood of data leakage.