Cyber Defence-In-Depth Services

Equipping your business with layered cyber defence strategies and technology

Cyber defence strategies to prepare your systems against any attack

Equip yourselves with reliable tools and ongoing maintenance services that will help keep your business secure from cyber attacks. We continuously evaluate, update, and improve our defence strategies to ensure that you always have the best-in-breed.

Our Cyber DiD service will provide a layered defence strategy against cyber threats. Why have an alarm system when your door is locked and you have bars on your windows? Because when a burglar still manages to get in, you need to know about it – that’s layered defence; and it’s even more important when dealing with the world of cyber crime.

Services on this page

Get started & solve your problem!

Mini-Pen Testing

Mini-pen tests have found saved passwords for online services, including executive personal logins, banking information, and supplier accounts as well as the ability for attackers to move freely throughout the network after accessing only one computer.

All of these means that the organization is a single click away from being fully compromised.

Problem

Organizations don’t know how easy or difficult it would be for an attacker to access critical/confidential information and move throughout the network environment if a system did get compromised. Unfortunately, full-blown penetration tests can be cost prohibitive (starting at $10K USD and increases according to the complexity of the environment).

Solution

Conduct regularly scheduled mini-pen tests to identify inadequately protected resources such as incorrect permissions, saved passwords unrestricted remote access, etc.

Positive Result

Improve cyber defences and protections to limit damage if an attacker does gain access.

Get started & solve your problem!

Microsoft 365 Security Analysis

Scans almost always reveal incorrectly configured tenants and temporary changes made by IT for troubleshooting that were never reversed. Regularly checking for inconsistencies ensures ongoing protection.

Problem

As businesses evolve and grow, new and/or updated software platforms are implemented, devices are updated and replaced, employee roles are created, removed, or changed, vendors and clients are added or removed.

Normal changes to the business can impact the accuracy of existing security policies.

Solution

Scheduled reviews of, and updates to, security policies to ensure they are keeping up with the changing business and threat landscape.

Positive Result

Management and employees are kept aware of policies intended to protect them and the business.
In addition, scheduled reviews and updates ensures ongoing compliance requirements.

Get started & solve your problem!

Internal Vulnerability Analysis

Vulnerability analysis has revealed issues such as unauthorized devices connected to networks and user account vulnerabilities. Fortunately, the issues were identified and resolved without incident and prior to the next scheduled compliance review.

Problem

Vulnerabilities can be introduced to a network in a number of ways, including failed automatic updates with no notifications. Some infrastructure equipment such as firewalls, switches, printers, etc. may not update automatically. Planned changes within a company’s environment can inadvertently introduce vulnerabilities. Administrator password rotation can fail without notice

Solution

Conduct automatic scheduled vulnerability monitoring to identify configuration issues and/or missing security updates.

Positive Result

Ensure that the latest security patches are in place, not only to reduce cyber risk; but to also maintain compliance with cyber insurance requirement and any applicable standards.

Get started & solve your problem!

External Vulnerability Analysis

When we first ran an external scan on ourselves many years ago, we kept finding a device exposed on our network. The problem was that it didn’t match any known address nor did the equipment manufacturer match any of our equipment. Needless to say, we were very concerned.

We managed to track down the problem to a default “wildcard” record created years before by our domain registrar. We didn’t actually have a vulnerability because the record was pointing to the registrar’s own resources. Nonetheless, we were concerned about possible fraudulent activities somehow tied to our domain so we removed the rogue record, informed the registrar of their vulnerability, and recommended that they change their default practices.

Problem

Organizations may not be aware of how exposed their organization may be from the outside when it comes to their network and cloud resources.

Solution

Conduct automatic scheduled external vulnerability monitoring to identify exposures that could create an opportunity for an attacker to access your resources.

Positive Result

Remediate any found vulnerabilities before they can be exploited.

Get started & solve your problem!

Administrative Group Change Reporting

We’ve received alerts for new administrative accounts being created and were able to immediately investigate. Fortunately, it was legitimate because an approved new application required dedicated admin access. However, if the application had not been approved, the account would have been immediately disabled.

Problem

When criminals gain control of resources, one of the first thing they do is create an administrative account that only they can use and control. Because they aren’t using a main admin account, they essentially have covert unlimited privileges to access everything.

Solution

Monitor for changes to administrative account groups. Whenever a change is made to any administrative account, it is flagged and/or an alert generated.

Positive Result

When a change is detected, it can be investigated and if the change was unauthorized or unexpected, the account disabled to block access by the criminal.