IT Security Assessment | Secure Solutions Technology Partners

IT Security Assessment | Secure Solutions Technology Partners

Contact Secure Solutions Technology today for your Free Cyber Security Assessment!

 

Ransomware has been described by cyber experts, as the "Epidemic of our time."  Here are just a few facts to consider as you think about Cyber Security for your business:

  • Worldwide damage costs are expected to exceed $6 Trillion by 2021

  • In 2018 58% of all cyber-attacks hit small business

  • 60% of small businesses go out of business with 6 months of an attack or data loss.

So how do your protect your business?  Start with a complete IT Security Assessment to understand where the are gaps and the steps you need to take to improve.

In 2018 the National Institute of Standards and Technology established a Core Framework for improving cyber security.  They identified 5 key areas of focus to improve any cyber security plan.

NIST Standard - IT Security Assessment

At Secure Solutions Technology we have built our Cyber Security Platform around the NIST standard and it requires a complete multi-layered approach centered on each of the 5 key areas of focus.

Cyber Security Layers - IT Security Assessment

Level 1

Starting with perimeter security, we look at how your business operates, i.e. retail, Doctor or Dentist, industrial parts broker, etc.  Each business has different needs.  If you expect to have walk-in traffic than you obviously need to keep your doors open during business hours.  If you don't have walk-in traffic it may make sense to keep your door locked.  In addition to the office access we evaluate the current network and hardware security within your office.

Level 2

Next we look at firewalls, advanced security gateways, wireless networks, guest networks, business application portals, remote workers and other factors that impact the necessity to access your network from outside the building.  We can develop a comprehensive plan to ensure your business operates as needed but remains as secure at the same time.

Level 3

Advanced email security is a critical part of any cyber security plan.  94% of all malware that infects businesses comes from email and/or employee behavior.  Advanced email security provides protection from incoming emails with embedded viruses or malware.  It also protects against employees clicking on links to malicious sites.

Level 4

Next, we look at advanced endpoint protection or anti-virus.  Unlike typical anti-virus products, advanced endpoint protection uses artificial intelligence to monitor activity in core operating system of your workstations, servers and laptops.  It looks for suspicious activity, tracks it and if needed can rollback any activity and isolate the malware to eliminate it from your hardware.  It offers the most comprehensive ransomware protection on the market.

Level 5

Along with email security, we look at employee training and awareness.  Keeping employees aware of the risks and constantly reinforcing it with training is a key step in improving you security.  In addition, if you have cyber insurance for your business, training your employees and providing proof of testing may help to reduce your cost of insurance.

Level 6

The last layer of defense for your business is a business continuity and disaster recovery (BCDR) solution.  It's not just data backup.  With BCDR, your not only backing up your data, you making sure the data works when needed with planned disaster recovery drills.  Don't think you need to worry about a data loss!  Think again.

  • In the use over 140,000 hard drives fail each week
  • 60% of backups are incomplete, and
  • 50% of backups fail at the time of restore.

So, if your backup doesn't include disaster recovery and you lose your data, you may be praying that your not in the wrong 50%.

Most importantly, you want a data backup solution that allows you to virtualize your backup into a functioning server.  If your server is attacked and disabled or you lose your data due to a hardware, software or human error, having the ability to virtualize your server means your back up and running in a matter of minutes rather than days or weeks.  In other words, your business continues as usual.

Finally, surrounding all of this, we evaluate both your proactive and reactive response capabilities.  Proactive will include policy management, i.e. password policies, policies protecting against shadow IT and 2 factor authentication.  Reactive responses means your systems are monitored for potential issues.  This allows for faster response and remote problem mitigation.

For more information or to schedule your own Security Assessment, call us today at 704.754.8484 or email us at [email protected].

What is a zero-day attack? Viruses and malware are written to take advantage of inadvertent...
It seems like we hear about major corporate breaches every day.  Whether it’s Equifax, Target,...
What is two-factor authentication (2FA)? 2FA is an added layer of protection for your online...
Today the average American spends 24 hours a week online. Either on their mobile devices...
Most of us have probably heard of the Dark Web. Do you know what it...
To help celebrate National Small Business Week, Secure Solutions Technology in downtown Salisbury is offering...
According to a 2019 Future Workforce Report by Upwork, 73% of businesses will have remote...
  What does file-less mean? Typically, cyber criminals have primarily delivered their malicious payloads, i.e....
  What is Patch Management? Patch management is part of an overall systems management plan that...
  What is a VPN? VPN stands for Virtual Private Network.  In simplest terms, a...