Data loss prevention: control over your data
What might the recipient do with your email when he/she receives it? What if your employee places all the data on a USM stick and resells this? These are questions that keep every business leader awake, which is why every company should have elaborated data-loss prevention techniques whereby, for instance, it is no longer possible to copy data or print or forward emails. There are various solutions for this, and we can assist in making the right choice and deployment.
Internal penetration test: the insider hacker
What if someone just wanders in and connects their laptop to the network – can they inflict damage? Can they commit data theft? Or could disgruntled employees stop servers or spread viruses? You should know and not fear the answer to this, and it is thus extremely important to have a consultant with a hacker mentality perform a regular check, who can explain what actions should be taken to take security to a high level.
Active Directory security health check
The Active Directory is often the database in which all users are defined, yet is unfortunately also often not under control due to years of migrations form old to new versions, or due to poor everyday monitoring. It is soon forgotten that employees leave service and retain all rights to log in remotely, or there are often a lot more administrator users than supposed. It is important to perform a test so as to take focused actions based on the outcome, to protect the environment's heart from misuse.
Even if anti-virus is installed on every device, a virus regularly slips through the mesh of the net, and then manage to seriously escalate. Consider the recent outbreaks of ransomware whereby data was made unreadable and a hacker asked for money to reset everything. But does paying ransom stop after once? Following a virus outbreak, it is extremely important to be able to call on the right people who can keep cool-headed together with you and swiftly undertake the right decisions.
Certificates: how to use them correctly
Certificates are used for numerous applications: for securing websites (https://connections) or protecting sensitive data internally. Unfortunately, the plan is frequently no more than a few thoughtless clicks, meaning problems are later encountered. A considered design is extremely important, and experience is the first requirement in this regard.