Did you know?
1 in 5 Small businesses will suffer a cyber breach this year
81% of all breaches happen to small to medium businesses
95% of all breaches can be prevented with today's technology & Cyber-Educated Staff
Maximise your Information Security with tailored detection, protection and recovery plans.
Most companies think cyber breaches are only caused by malicious attacks, however 35% of cyber breaches are caused by staff errors. Professional services in the financial, legal and medical services make up a majority of reported breaches and are most vulnerable to phishing and criminal attacks.
Once breached, an attack can take up to 23 days to resolve and cost hundreds of thousands of dollars. More importantly, they will cost the trust of your clients and your reputation.
Don’t bury your head in the sand when it comes to cyber-security. Virtual IT Managed Services will work with your team to create a tailored plan to protect your business from attack and accidental breaches. Through review, planning, technology and education you can ensure that your systems will keep you and your client’s data safe.
No one solution fits all. Each cyber-security solution is customized to the business needs and consists of a combination of security best practices based on the Essential Eight and Security Awareness Training to help reduce the risk of human error.
UNIFIED THREAT MANAGEMENT & INTRUSION DETECTION
Maintaining control of your network and data is becoming an increasingly difficult process. With compliance being necessary for many businesses, it is important to have a Unified Threat Management firewall that can detect, defend and alert to threats and suspicious traffic.
In the event of intrusion, the loophole needs to be identified, closed and if necessary, reported on.
Our team can work to provide a solution capable of compliance with all necessary legislation as well as providing you with reports on your network traffic and data access.
Contact us today to discuss your options.
24 x 7 x 365 SECURITY OPERATIONS CENTRE (SOC)
Our Security Operations Centre (SOC) is constantly staffed with security experts monitoring your network & endpoints.
In the event of a breach, our SOC will respond by containing access, alerting us (and you) of the intrusion and mitigating further threats. If necessary, environments can be restored from backups to confirm data integrity and copies made of potentially breached infrastructure to be sent for further analysis.
From here, we can discuss further requirements around breach reporting, then through analysis work out the best way to prevent this happening again.
Ensure your organisation is secure and compliant with all relevant legislation. Let us take the stress out of managing your security.
OFFICE 365 RISK WATCH
When Virtual IT enables Office 365 Risk Watch for a site, the service alerts us if any of the six risk events that Microsoft provides for Office 365 accounts have been detected.
- User with leaked credentials
- Sign-ins from suspicious IP addresses
- Sign-ins from malware-infected devices
- Impossible travel to a typical locations
- Sign-ins from unfamiliar locations
- Sign-ins from anonymous IP addresses
We continually monitor and help you stay alerted to key security risks associated to your Office 365 account. When an active risk event is detected, a support ticket is created and our Security Operations Centre (SOC) investigate the issue and remediate to keep you and your data safe.
DARK WEB SCANNING
Often when information is stolen, it’s for one of two reasons.
a) it was targeted
b) it was just there
In either event, the information can often end up for sale in an open marketplace, with purchasers hoping to be able to exploit and match stolen data with other leaked information for the purposes of identity theft & more.
Virtual IT can scan the dark web for credentials, information & more relating to your organisation.
Once an initial scan is completed, we monitor ongoing to ensure that if any of your accounts are breached (not just internal accounts; we can actively search email addresses), you’ll know as soon as possible.
SECURITY ASSESSMENT & CYBER AUDITING
Information Security is only as good as it’s weakest link.
Are your systems, network and data protected against current and emerging security threats?
When reviewing Cyber-Security, Virtual IT uses tried and tested methodologies to scan the entire system end to end and identify any potential weaknesses.
We then make recommendation and implement best practice solutions into your business to minimise risk and respond to emerging threats.
SECURITY AWARENESS TRAINING (SAT)
Security Awareness Training sessions are tailored for each company to help reduce the risk of human error. Our aim is to arm your team with the skills they’ll need to determine potential security threats before they open them.
The last and one of the most important aspects of Cyber-Security must be to arm your people. The fact is, that in many cases, breaches are caused by people entering credentials into unsafe websites, or opening files sent to them by supposedly legitimate looking senders.
- Are your staff aware of their responsibilities in keeping company data safe?
- Do they know how to spot a phishing email or what they should or shouldn’t be doing on ‘free’ Wifi?
Virtual IT’s Security Awareness Training will profile your staff ahead of time without their knowledge, so the training meets the needs and gaps in your organisation to help reduce the risk of human error.
Virtual IT Managed Services has partnered with the Joint Cyber Security Centre (JCSC) which is part of the Australian Cyber-Security Centre in conjunction with the Australian Signals Directorate.
The ACSC has published a paper known as the “Essential Eight”. This is a mitigation strategy that will ensure increased resilience to cyber attacks and information leakage.
To quote the ACSC “While no single mitigation strategy is guaranteed to prevent cyber-security incidents, organisations are recommended to implement eight essential mitigation strategies as a baseline.
This baseline, known as the Essential Eight, makes it much harder for adversaries to compromise systems. Furthermore, implementing the Essential Eight pro-actively can be more cost-effective in terms of time, money and effort than having to respond to a large-scale cyber-security incident.”
Virtual IT can design and implement an Essential Eight model into your business using a variety of solutions to ensure compliance with the framework and ultimately secure your business.
MANDATORY DATA BREACH REPORTING
On Feb 22 the Australian Government’s Notifiable Data Breach (NDB) Scheme came into effect. Under the NDB Scheme companies with a turnover exceeding $3m; that handle people’s personal Identifiable Information (PII) like bank account information, credit card details, medical records etc, are obliged to report data breaches to the Office of the Australian Information Commissioner (OAIC). They must also directly inform people whose information is exposed so they have the best possible opportunity to protect themselves from adverse effects.
The OAIC defines a data-breach this way:
“Unauthorised access (of data) by an employee of the entity or an independent contractor, as well as unauthorised access by an external third party…For example; a computer network is compromised by an external attacker resulting in personal information being accessed without authority…”
This means businesses not only need to ensure that their data is secure; but they need to ensure they have the ability to monitor, investigate and report any intrusions.
Virtual IT can supply custom templates for "Data Breach Response Plans" and "Data Protection Policy" etc to ensure you meet your obligations with regards to the new legislation.
Not Sure If Your Business Is Secure?
Regardless of the type of industry you are in, we understand that cyber-security is crucial to your business. Hackers don't care what data you store, they care that your data is critical and irreplaceable which you need access to at a moments notice.
With 30+ years working in Technology and Cyber-Security, one thing we know for sure is that it's not a matter of if you will have a cyber-security event, but WHEN.
”Don't Wait Till You're Breached Before You Seek Help“
Virtual IT Managed Services can undertake a comprehensive inspection of your organisational systems / infrastructure and provide an easy to understand action plan to mitigate threats going forward. We design solutions to protect businesses as small as one user to ensure peace of mind.
7 Critical Security Protections Your Business Should Have in Place Now
Don't be the next victim!
This report will get you started in protecting everything you've worked so hard to build.