The threat of a serious attack on your network is ever present and growing. Losing access to your files, or worse, having your files in the hands of someone else is devastating for a business. The downtime alone costs businesses thousands of dollars. Having a robust system in place is the only way to protect your business and your clients. CBM Technology follows a Defense-In-Depth Strategy to deploy a 5 layer system of protection. We monitor your network 24/7 and eliminate any threats before they attack. In the event of a breach, we can have you back up and running in 15 minutes.
Managed Security is a set of network security services geared towards prevention and defense against multiple threats internal and external. These threats can affect business productivity and privacy. Threats are anything that can harm a business or a user. They can come in many different forms such ransomware, brute force, phishing attacks, disgruntled employees, social engineering, etc.
Whether internal or external, threats to security continue to evolve and become more complex where a single level of security is no longer practical. Organizations used only anti-virus software or simple firewalls to block threats in the past; now it is required for an organization to be protected on all levels.
Prevention, Detection, Recovery
The best method to combat threats is obviously preventative methods. There are instances when a threat bypasses these preventative methods, then detection is important to be able to stop them. Ability to recover quickly and painlessly is just important as a final safety measure.
Infrastructure is the first line of defense between the outside world & your network.
This includes Firewalls, Wireless Access Points & Switches.
APT Blocker: Monitors your network for Advanced Persistent Threats and monitors us if one is present. ex. Ransomware & Zero-Day Malware
Spam Blocking: This is crucial to preventing the opportunity for malicious E-Mails containing malware
Controlling and protecting your data
Documents, Files, Spreadsheets, Databases
Making sure your data is backed up, making sure that sensitive information stays within your network and that data is secured when it leaves your network is essential.
We backup your entire system every 15 minutes. This includes not only your files, but your OS, Software, and settings as well. In the event of a breach, we will perform a full restore from the last backup, and have you up and running in 15 minutes.
Commonly known as Microsoft or Apple OSX
Applications are installed on top of operating systems such as Java, Flash, Firefox, Chrome etc. These products have security holes and it is extremely important that security patches are up-to-date to close these holes.
Operating systems also have holes so it is critical to also keep those patched.
Where information flows
Devices that connect your infrastructure to the outside world: Workstations, Laptops, Servers, etc.
One of the most common and necessary ways of protecting your endpoints is to install Anti-virus and Anti-malware software.
POLICIES & PROCEDURES
The glue that keeps all 5 layers in tip top shape.
Education of employees.
The checks and balances to make sure your backups are successful and restorations are tested.