Protect against Cyber Attacks
Choose a level of protection to learn more
Cyber criminals are more active than ever, infiltrating organisations, stealing and ransoming data. Protect your:
• Operational Uptime
Nothing can guarantee you won’t be hacked. But you can, and must, mitigate your cyber-risk.
Cyber Security needs to be layered. It is much like home security: key lock, deadlock, chain/bolt, alarm and now cameras. Each layer adds an obstacle, but that is all they are. None of them alone will stop someone going in. It hopefully turns them away to find an easier target.
Even the base standard of Multi Factor Authentication is not enough. There are now 51 ways to hack MFA and they range from very sophisticated to simple user hacks.
Here it is, easy to find, on Amazon!
Choose a protection level:
Security S1 plan
Including Anti-malware, URL protection, ATP, Darkweb Monitoring, Exception Alerting, Phishing Tests and Security Briefings.
WE CONSIDER S1 AS THE MINIMUM LEVEL SECURITY MEASURES ORGANISATIONS SHOULD BE TAKING.
Security S2 plan
S1 plus Advanced EDR, Shadow IT Detection, Password Vault, Data Leak Protection, Breach Activity Scans and Deep Vulnerability Scans.
IF YOUR ORGANISATION RELIES ON DATA FOR ONGOING OPERATION OR REPUTATION, YOU SHOULD HAVE S2 LEVEL PROTECTION.
Download our latest executive “10 minute” briefing to share with colleagues
Read some of the latest news on Cyber-Security
"A cybercriminal only has to be lucky once, while a defender has to be lucky every minute of every day.” - Combating Ransomware - A Comprehensive Framework for Action: Key Recommendations from the Ransomware Task Force. The message we hear from governance...
What is 'Shadow IT'? Shadow IT refers to the various web tools informally in use within most organisations. These tools are often chosen without reference to IT or to management in general. They are often used for all the very best reasons. Your colleagues have work...
Some emails are more than just bad news No one likes bad news! But sometimes it can’t be helped. Sometimes it sneaks up on you. One of the most common ransomware attacks is through a compromised attachment in an email. It’s easy to say “only open stuff you expect” but...
Data Leak Protection (DLP) is the name of several policies in Office 365, setting up what data can, and can't be, shared and with whom. Imagine being able to automatically identify private information like passport numbers, Health IDs or bank account details and make...
This sounds like a nightmare that could never happen. US soldiers have been putting sensitive information online in non-secure third party websites. It defies belief, yet we’re reading that it happened. The story popped up on ‘Gizmodo’ . It is alleged that US Soldiers...
Password Vaults and You With more and more websites necessary for our everyday activities, it’s getting harder and harder to manage passwords. By now, you will know not to write passwords on post-it notes and paste them on your screen. Its not uncommon for...
Chrome security fixes Google has released Chrome version 91.0.4472.101 for Windows, Mac, and Linux. This update includes 14 security fixes. Out of the 14 fixes, 1 is considered to be critical in nature. If you are supported by KARE Core Fundamentals or Premium KARE...
Good practice last year isn’t good enough anymore. Even cyber-insurance providers are getting more selective before accepting cover, or worse, before paying claims. With the number of claims skyrocketing insurers are increasingly asking, "What did you do to...
Why you need to know all the cloud services that your organisation uses – part 2 – (US DoD Nuclear Secrets!)
People are the weakest link This sounds like a nightmare too impossible to happen. US soldiers putting sensitive information online in non-secure third party websites. It defies belief, yet we’re reading that it happened. The story popped up on ‘Gizmodo’ It is alleged...
If you don't where it is, you can't protect it. Do you know where ALL your organisation's data is - not physically, but on which web and cloud services? Here's the problem. If you don't where it is, then you can't protect it. The secondary problem is finding out,...