You sit down at your desk on a Monday morning and scan through the multitude of emails that came in over the weekend. Along with all the junk mail, newsletters, etc., you spot one from Microsoft reminding you that your password needs to be reset. Since it looks legit, you click on the big button to update your credentials.
You are directed to a landing page with a form to enter your username and password. Since you’re in a rush to start the day and you want to make sure you can use your Word & Excel applications, you submit your info to get a new password. That password reset never comes…
Your heart sinks as you realize you may have just been phished.
Situations like this happen on a daily basis. With some training and tools as described below, you can rest easy knowing that should one of your employees make that same mistake, the repercussions of a cyberattack will be minimized.
Why you need to address cyber protection
There are new “necessary minimums” in security practices & protection that all users need to have in place in order to keep business systems safe. These include multi-factor authentication for login information, phishing awareness training for email use, password policies, and cyber incident response systems/procedures should an incident occur.
Insurance companies are tightening up on their cyber insurance underwriting standards – requiring companies to adopt certain policies and procedures. That includes all managed service providers and the cyber protection solutions that are in place for their clients.
Cyber protection tools and solutions we use to keep our clients secure
Here are descriptions of some of the tools and services that we have instituted as base minimums for our clients.
Advanced Threat Protection
This layer of protection provides automatic Sandboxing & machine learning capabilities which allows for the testing of potential threats without putting your systems at risk. When enabled, ransomware, custom malware, and zero-day threats are detected in real-time vs identifying them from a typical antivirus database.
Endpoint Detection & Response
Every device and resource connected to your network creates an entry point (endpoint) that can be exploited by cybercriminals. Endpoint Detection & Response monitors anomalies across all the endpoints in real-time. Unnatural behaviors are detected and quarantined for evaluation, reducing your risk of a costly breach. This helps us provide a faster response to root cause analysis.
Ransomware Detection & Isolation
Ransomware has become one of the costliest threats; wreaking havoc on businesses and individuals alike. Ransomware Detection & Isolation provides an extra layer of security by proactively identifying crypto-ransomware threats before they can do significant damage. If ransomware is detected on a device, RDI attempts to stop the ransomware process. It then isolates the device away from the network, which prevents it from spreading to all the other workstations and devices on the network. We receive alerts immediately to take effective action to resolve the issue.
Dark Web Monitoring
Part of a ransomware attack may include acquiring personal information such as names, logins, & financial information. This information is also acquired during security breaches to websites, databases, & servers. All this info is then sold on the Dark Web for cybercriminals’ use in spam and phishing attacks. With Dark Web Monitoring we are alerted should your company email accounts become compromised. We follow up with you before a potential breach could occur.
Phishing Awareness & Anti-Phishing Campaigns
Cybercriminals design some pretty sophisticated and legitimate-looking emails that are used in phishing campaigns. These emails are designed to get you to click on a link that could then send you to a site that automatically downloads malware, or prompt you to enter your credentials into a form. The criminals will then use or sell on the dark web. With phishing awareness training, your team is taught how to identify these fake emails and how to avoid falling for scammers’ tricks.
Keep your systems protected from cyber threats
Do you have your systems enabled with the above-mentioned solutions? If not, give our office a call to learn more about security measures that will keep your business protected from a major cyber incident. 508-205-1114
Leave a Reply