Cyber Security
- Home
- Cyber Security
Satisfied Clients
Completed Projects
Years of Experience
Vendors Supported
Cyber Security
Protect Your Business from Cyber Threats
We live in a dangerous world and protecting your networks and data has become the most important part of any IT managers’ role. We can help you to protect your organisation and ensure compliance with corporate and/or government standards.
Cyber Essentials is the starting point for compliance and certifies that your organisation is well prepared to deal with common Cyber Threats. Contact Us today to learn how we can guide you to full compliance and certiication. If you are part of a larger organisation there will be a long list of requirements, see some examples below.
"Empowering Your Business with Expert Consultancy and Tailored Cyber Security Solutions"
Please get in touch to discuss your current Cyber Security landscape and challenges. Let’s see how IPswiTch Networks can help guide you towards full compliance.
Cyber Security
Compliance
Never before have organisations been asked to comply with so many standards across the board. Cyber Security is one of the most pressing areas that simply cannot be ignored.
Whatever your cyber security compliance goals – starting from Cyber Essentials, to CIS and MTSB benchmarks we can advise and navigate you to the right blend of solutions in order to satisfy the requirements and to ensure protection from Ransomware, Malware, Unauthorized Access, Data Exfiltration and Data Loss.
A blend of security controls is required in order to offer complete protection for endpoints, the network, your applications and most importantly your data.
FAQ
IPswiTch Networks can help you answer all of these questions.
Cyber Security - FAQ
Are your backups automated, or manual? Are they onsite or offsite. Tape or disk?
Do your backups rotate and eventually overwrite the same media/storage? Can they be deleted?
The main protection against Ransomeware is an immutable backup. Ransomeware infects your file system, which then infects your backups. You need to be able to revert back to a full backup prior to the date that the files were impacted.
One of the main protections against unauthorised access is Multi Factor Authentication. This can be in the form of smart phone apps - eg MS Authenticator, or hardware tokens from RSA, or text messages. This stops a bad actor from stealing your password and logging onto your system.
How can you ensure that only authorised persons and devices are able to log on to your systems? Step one is identification. Various methods exist such as facial recognition, thumb prints can identify a person. TPM chips can identify an authorised device. NAC (Network Access Control) also keeps unwanted devices off your network.
Next Generation Firewalls, Proxy Servers, Intrusion Detection systems, Web Application Firewalls are just a few of the systems that can be deployed on the edge of your network to provide protection from external public networks.
When your users are browsing the web, how do you manage which sites they can access? A Web Security solution provides content filtering that ensures only compliant sites are accessable.
A denial of service attack is usually generated from many zombie machines on the public Internet that all send traffic towards your site, causing an overload. To mitigate this threat consider a solution that can scrub traffic on it's way to your site. This strips off the bad traffic and allows only the good traffic to reach you.
This is a big subject, but one way to assess your AD compliance is to test it using software such as Pingcastle. From here you can gradually improve your compliance score. Consider E3 or E5 security suits to help secure your Microsoft estate.
There are several ways to protect your network and your endpoints from Malware. Consider Proofpoint if using MS Exchange to scan inbound emails. For endpoints anti-virus software such as ESET or Defender For Endpoints (as part of E3 or E5 suits). Larger organisations could also look into EDR and NDR solutions to further protect networks (including those in the cloud) and endpoints respectively.
A Data Loss Prevention solution is the answer here. Firstly correctly label and classify your files, then define a data loss policy for each class. You could use AIP on-prem to classify (part of the E5 suit) and Purvue can help in the cloud. Having a DLP policy in your Defender suit dovetails into the above components if you are a Microsoft customer. Of course many other more generic solutions exist from companies like ESET, Checkpoint and other security vendors.
Have you identified what data must be protected at all costs? Data which, if lost, could cause major disruption to the business. Once you have identified you crown jewels you can develop solutions to protect them.
This might seem obvious but your third party suppliers can increase your Cyber Security risks unless they are following the correct processes. Consider using third party assessment and vetting companies to measure the level of risk posed by external partners, especially in cases where they have access to your infrastructure.
Another big question. The networks at home worker sites are often unmanaged. Often the best strategy is to provide a secure device which alone is provided access to your infrastructure via secure VPN or private connection. That device must be monitored and be fully compliant with corporate standards. Zero Trust is a popular strategy these days.