IT Security for your Business
IT Security for your Business 2.1
How safe is your network? How safe are your team’s desktop PCs and mobile devices? We can perform vulnerability testing to assess your network and devices.
Firewall protection for your network
A firewall acts as a barrier between your network and the rest of the world via the internet. Having a good quality, properly configured firewall in place can eliminate threats before they reach your servers or PCs. We can supply, install, configure and manage Next Generation firewalls to protect your network.
Desktop / laptop security
We can perform security hardening of Windows and Mac devices to make sure that your operating system and applications are both up-to-date and security patched. We can supply and install quality anti-virus / anti-malware software that prevents malware infections from wreaking havoc or stealing data.
Laptop / Mobile device encryption
A laptop that gets lost or stolen can result in confidential information being accessed by an unknown third-party, and an operating system login password can be bypassed within minutes. For this reason, the encryption of mobile devices is needed to prevent data leaks. If your business or organisation stores customer information on mobile computing devices, then you are legally required to encrypt them in order to comply with the Data Protection Acts 1988 and 2003.
Wireless network security
Is the security on your wireless network configured properly? If not, a weakly protected wireless network can provide a backdoor to all sorts of snoopers. Our technicians can check if your wireless network is configured correctly, before applying the latest encryption and authentication protocols to your network to make it as secure as possible.
A good way to test if your IT security is working properly is to perform an intrusion test. This is basically a simulation of a hacker trying to access your network and can be a very effective way to find weak-spots or vulnerabilities on your network.
Security Awareness Training
Sometimes a business might have textbook-style IT security processes, detection software and security appliances in place, but they still end up getting compromised. Often, this can be attributed to a “social engineering attack”. This is where one of your users is tricked into divulging confidential information, such as system passwords, bank details or credit card information. While many users claim “that would never happen to me”, we have seen finance administrators right up to board-level executives getting tricked by highly-elaborate schemes designed to extract information. One way to mitigate against such attacks is through IT security awareness training, where users are trained the spot tiny incongruences in on-line or off-line transactions. For bespoke IT security training, please contact us.
Next-Generation Firewall solutions
Unlike a unified threat management system, the data packets are not bouncing around from one sub-system to the next. Instead, with next-generation firewalls, one single consolidated engine performs a deep packet inspection, intrusion prevention and SSL and SSH interception. One of the greatest advantages of an NGFW is the application’s awareness to identify applications at a semantic level. For example, if you are streaming video on an non-standard HTTP port, a traditional or UTM firewall might block it. A next-generation firewall is smart enough to recognise that an unusual port being used does not necessarily equate with a security risk. This is because it goes beyond the old-style “ports” and “protocols” to holistically analyse and block threats intelligently.
RealClear were helping an organisation in Sandyford, Co. Dublin who were getting an increasing number of requests from visitors for internet access, and were a bit wary because they did not want visitors logging on to their network and possibly accessing their confidential files. RealClear was asked to devise a solution that would enable guest internet access and provide better protection for their corporate data. We setup a VLAN and separate SSID on their wireless network specifically for guest access, so now guests can login with just a username and password to a guest network that is securely segregated from their main business network.
Some best practice guidelines for better security
Make sure that all your systems have all their updates and patches applied.
Produce user security policies that cover acceptable and secure usage of your organisation’s systems.
Make sure that your network perimeter is fully secured to filter out unauthorised access and malicious content.
Establish anti-malware defences on your computer systems because traditional anti-virus solutions can no longer provide adequate protection.
Analyse the logs for all systems and networks for unusual/suspicious activity.