Step ONE: GAP ANALYSIS
STEP TWO: IMPLEMENT SECURITY NETWORK CHANGES
✅ We carried out an internal security audit where we examined their wireless
infrastructure, firewalls and switches; by checking their configuration and policies we were able to alleviate the risk of unauthorised user access. For example, as a method of first line of defence, we blocked ports on specific firewalls to limit certain types of inbound and outbound traffic.
✅ We implemented advanced security spam and malware filtering so any future phishing emails, which are the most common attack vectors in today’s threat landscape, would be blocked.
✅ We also implemented security policies to control and manage updates, this ultimately ensures the network remains secure and any vulnerabilities are addressed – Keeping Hansel Henson one step ahead of the threat.
STEP THREE: TRAINING
✅ How to spot a phishing email; we ran a series of spoof email campaigns so employees could identify the methods used by hackers to gain access to company data.
✅ How to spot a whaling email; this is an extension of a phishing email, but this type of threat usually targets senior management and contains legitimate or official information.
✅ How to comply with methods of cyber security best practice; we educated Hansel Henson on topics such as password protection, open and closed WIFI networks and pop ups.
TWO-FOLD SECURITY IMPLEMENTATION
If you want to know more about our managed security services or user education courses, get in touch today.