fbpx
 

Cyber Security

cropped Cyber Essentials logo HiRes

Cyber-attacks are spreading in number and severity and becoming more expensive and time consuming to resolve; we all need to protect our networks. Ransomware attacks are commonplace, with business, health authorities and education all heavily targeted. Partner with DMS to get certified and comply with the government backed Cyber Essentials scheme:

Reassure staff, clients, suppliers, students etc

Get a clear picture of your cyber security level

Cyber essentials is likely to become a requirement:

Of insurers to provide network cover

Of Government for education establishments and businesses

Already a requirement for businesses seeking some government contracts

DMS Security Essential Package 1 2 3
Assessment of Server Infrastructure
Penetration Test (max 5 servers, 2 external IP addresses)
Back Up Review
Firewall Review
Detailed Report and Recommendations
Assistance with Cyber Essentials Accreditation
FortiGate Cyber Threat Assessment Programme (CTAP)
Assistance with Cyber Essentials Plus Accreditation

Here are some measures we recommend for you to consider. Contact us to start on the road to protection …

 

Penetration Testing

 

DMS can test your network, providing feedback to help you assess, improve and manage the security of your organisation.

 

“A penetration test should be thought of as similar to a financial audit. Your finance team tracks expenditure and income day to day. An audit by an external group ensures that your internal team’s processes are sufficient.”

Government Guidance

 

national cyber security centre ncsc logo vector

User Security Awareness Training

 

A huge contribution towards protection is training your staff to be more aware and alert to the signs that an attack is under way. One of our partners, KnowBe4, are experts in this field. They carry out user security awareness training including simulated phishing attacks, to heighten the knowledge of users and their sensitivity to illicit activity.

 

CYBER SECURITY

Firewalls

 

For a protective firewall that monitors traffic to your network, DMS uses Fortinet’s Fortigate for head office solutions, with Zscaler preferred for companies with multiple mobile workers.

fortinet.jpg 1

Fortigate

Protect mission critical applications

Highly scalable segmentation and ultra-low latency to protect network segments

Validated security effectiveness

Independently certified and continuous threat intelligence updates provide robust protection from known and unknown attacks.

Enterprise class security management

Consistent policy; Single pane-of-glass to manage security assets irrespective of location or form factor.

Automated risk assessment

Leverage automated workflow and auditing features to deal with scarce security staff; continuously maintain compliance posture.

Security fabric integration

Intelligently share threats across the entire digital attack surface for quick, automated protection.

High-performance protection

Industry’s highest threat protection & SSL inspection performance to protect from malware attacks hiding in encrypted traffic.

scaler 1

Cloud Firewall

Enables secure local internet breakouts

Provides direct to internet connections for a fast user experience, without any appliances to deploy or manage

Reduces costs and complexity

Optimizes MPLS backhauling spend and eliminates costly and time-consuming patch management, coordination of outage windows, and policy management

Security and access controls for internet traffic on all ports

Delivers firewall-as-a-service to provide security and access controls for internet traffic on all ports, not just 80 and 443, to prevent advanced threats

Brings the entire security stack close to the user

Ensures identical protection for users – wherever they are

Scales services elastically

Handles SSL inspection and cloud application traffic requiring long-lived connections for fast user experience

Logs every session and delivers real-time visibility and policy enforcement

Across all users, all locations, all applications, and all ports and protocols from a single console

Email Security

 

Email is a universal communication tool and the data your users send and receive needs to be protected. It is main concern in Cyber secuirty One of the tools DMS uses is Mimecast Email Security with Targeted Threat Protection, designed to provide next generation protection against advanced email-borne threats such as malicious URLs, malware, impersonation attacks, as well as internally generated threats.

Secure Messaging

Safely transmit and control how users share and how recipients access confidential information through email

 

Continuity Services

Keep email flowing and archives accessible even if the primary system goes down. Mimecast works with mail on-premises, in the cloud or hybrid

Large File Send

Enable users to send and receive large emails through email without impacting your environment

 

Control Content and Data Loss Prevention

Inspect and manage how users send and receive sensitive information via email

Platforms

Mimecast knows email technologies and works with Microsoft Office 365, Microsoft Exchange or Google Apps for Work

Untitled 1 1

Device Security

DMS uses Microsoft Intune for mobile device management, mobile application management and PC management from the cloud. To complement Intune, DMS is pleased to use Webroot Endpoint to provide endpoint protection for all the devices, or ‘endpoints’ on your network – to help keep critical systems, intellectual property,good cyber security, client data, employees and guests safe from ransomware, phishing, malware etc. Benefits include …

Multi-vector protection

Protects against threats in real time across email, browsers, files, URLs, ads, apps etc …

Industry-leading efficacy

Secures endpoints with 100% efficacy over a 24-hour period.

No reimaging

Journaling/rollback features restore files to uninfected state; no need to reimage

Flexible billing

Offers monthly and annual subscription options; pay as you go, per device, per month.

Deep learning intelligence

A layered approach to global threat intelligence to continually refine and enhance classification accuracy.

Fast deployment & scans

Small endpoint client agent deploys/scans in seconds; always up-to-date – no bulky updates or definitions.

Online management

Enables anywhere, anytime, endpoint management online with hierarchical controls and visibility.

Lower TCO

Minimal system burden, improves automation, and streamlines management to boost MSP profitability.

Zero-hour security

Advanced behaviour heuristics identify and protect against never-before-seen threats

No conflicts

Runs alongside other security software. No need to uninstall existing protection.

RMM & PSA integrations

Integrates with leading RMM and PSA platforms for ‘single pane of glass’ MSP mangmnt.

MSP-Friendly Unity API

Enhances automation, reduces management costs, improves reporting, simplifies billing.

Data Security

 

Conditional Access is an Azure AD capability and Cyber security that Intune enhances by adding mobile device compliance and mobile application management. Intune and Azure AD work together to ensure only managed and compliant devices are allowed access to email, O365 services, Software as a Service apps, and on-premises apps.

Many mobile device management (MDM) solutions help protect organisational data by requiring users and devices to meet some requirements. In Intune, this feature is called “compliance policies”. These define the rules and settings that users and devices must meet to be compliant.

 

When combined with conditional access, administrators can block users and devices that don’t meet the rules.

For example, an Intune administrator can require:

User access to company data on mobile devices via password

The device isn't jail-broken or rooted

A minimum or maximum OS version on the device

The device to be at, or under a threat level

You can also use this feature to monitor the compliance status on devices in your organization.

Additionally, you can set a policy in Azure Active Directory to only enable computers that are domain-joined, or mobile devices that are enrolled in Intune to access Office 365 services. Intune provides device compliance policy capabilities that evaluate the compliance status of the devices. The compliance status is reported to Azure Active Directory that uses it to enforce the conditional access policy created in Azure Active Directory when the user tries to access company resources.

GDPR

 

Did you know you have a legal requirement to report major data breaches to the ICO within 72 hours. Failure to notify can result in a fine of up to €1 Million! DMS can take you through your obligations and the requirements of GDPR to help you to become and remain compliant.

REQUIREMENT

You should have robust breach detection, investigation and internal reporting procedures in place’

DATA BREACHES INCLUDE

Sending data to the wrong recipient.

Loss or theft of devices containing data

Access by an unauthorised party.

Sending data to the wrong recipient.

GDPR ACCOUNTABILITY

You must be able to demonstrate compliance.

Certifications (eg ISO 27001) can help.

The device to be at, or under a threat level

Additionally, you can set a policy in Azure Active Directory to only enable computers that are domain-joined, or mobile devices that are enrolled in Intune to access Office 365 services. Intune provides device compliance policy capabilities that evaluate the compliance status of the devices. The compliance status is reported to Azure Active Directory that uses it to enforce the conditional access policy created in Azure Active Directory when the user tries to access company resources.