What would happen to your organisation if customer information leaked, your company data was held to ransom, or your entire IT system was shut down?
Cyber security is about more than protecting technology. It’s about your reputation, your time, your customers.
Protecting your business from cyber security threats can feel overwhelming. That’s why we’re here to support you in your journey to becoming as secure as possible. From educating staff and gaining certifications to software and policies enabled.
Breakwater IT is certified in ISO27001 and Cyber Essentials. To gain the ISO 27001 award, we proved that we could not only prevent but defend against potential data system vulnerabilities. Take a look at some of the security services we offer below:
Cyber Security Audits
As cyber threats continue to advance, maximum levels of security are a serious consideration for any business.
To ensure your network has the best chance of combating cyber threats, we work with leading partners such as Microsoft, Cisco, Mimecast, and Datto.
With innovative solutions and collective knowledge, we can audit your current systems. We then make recommendations to remove vulnerabilities and enhance your defences.
Cyber Security Training
When it comes to security, the first, and most crucial step in protecting your business is educating your team – and we can help with this.
In partnership with Mimecast, we offer security awareness training. The training is delivered in bite-sized videos at regular intervals to keep your employees learning throughout the year.
Mimecast awareness training uses humour in the videos to keep viewers engaged. You’ll see regular characters in the videos including Human Error and Sound Judgement. These characters help make the training memorable, as Sound Judgement continually strives to stop Human Error causing breaches. Each video ends with a single question to test the viewer’s knowledge.
Alongside the awareness training we also offer simulated phishing attacks. These are designed to test your employee’s response to a potential email threat. You can use pre-made templates or replicate a legitimate phishing email with the harmful content removed.
To help keep our clients safe, we also send regular emails with tips and advice, as well as downloadable guides to share with employees.
You can download some of our free guides below or visit our Knowledge Hub for more.
To help combat Cyber Crime, the UK Government introduced the industry-backed Cyber Essentials certification scheme. Getting certified reduces the threat of attack by up to 80%. It demonstrates your commitment to protecting your data, as well as your customer and supplier data. The accreditation also helps you to address other compliance issues, including those around GDPR.
We take the stress out of completing the certification byworking with you to complete it. In addition to offering the Cyber Essentials certification, we apply enhanced levels of protection. This is exclusive to our clients and is built around our own cyber security objectives.
Once you’ve passed your certification, we’ll follow up regularly using our own security standard review. This means there is no panic when your certification is due for renewal as we’ve been monitoring your security throughout the year.
Our security standard review is a points-based system. We check areas including backup and disaster recovery, external breach analysis and network security. We share this with you to enable us to work together on improving your IT security.
We include security enhancements in our standard support package to keep your business safe. These enhancements aim to protect your business from cyber threats using a range of policies. By default, we will install the following:
- Logon / Logoff reports
- Ransomware protection
- Alerts of unencrypted disks
Additionally, you can request:
- Disabling cloud storage devices
- Prevention of public webmail access
- Prevention of social media access
- Disabling app stores
- Restrictions on administration tools and scripts
These settings can all be put in place to reflect your organisational policies. The policies listed above are included in our IT support package.
We’re frequently told that the biggest issue individuals have with passwords is remembering and storing them. But as a LastPass partner we can make that a problem of the past!
LastPass is an online vault which securely stores your passwords. The only password you’ll need to remember is the one to access the vault!
Sounds great, right? It gets better.
LastPass not only stores your passwords, but through browser extensions and its mobile app, it will detect the site you are trying to login to, and autofill the username and password for you based on what you have stored in the vault.
It can also generate unique, secure passwords for you, and flag any passwords that have been duplicated or found in a breach.
And if you need to share a password with someone in your organisation, you can do it through the LastPass portal. That means no more texting, emailing or instant messaging passwords.
LastPass isn’t just about your basic passwords though. You can also store other sensitive information in notes, or add addresses, card details and bank details.
If all of this wasn’t great already, LastPass business accounts come with LastPass families for free! That means you and your employees can use LastPass for personal passwords, and so can family and friends!
But why would you buy through us rather than going direct to LastPass?
We can take the burden off you with setup and ongoing support. That means when employees leave, forget their master passwords, or just need a helping hand, they can come to their local IT company where you know us, and we know you.
Plus, we can help with training you and your team on the platform.
Email Security with Mimecast
Mimecast delivers email security that protects you before, during and after an attack. Their cloud-based email security filtering removes risk by blocking 100% of known virusesand more than 99% of phishing emails before they reach your network.
In the event of an unplanned downtime, continuity and archiving services mean emails can be accessed and maintained. This means you can continue working without disruption. And if the unfortunate were to happen, your emails can be recovered fast.
In addition to all of this, Mimecast can support your brand through your email signatures. You can create and upload a company-wide email signature that will automatically apply to your sent emails from any device.
We offer penetration testing as a service for existing clients and businesses who are not a client of ours.
What is Penetration Testing?
Penetration testing, or pen testing, is a way of testing the security measures within an organisation. This is done by a series of attempted breaches, using the same tools and techniques and genuine hackers.
A team of ethical hackers will examine your IT systems, searching for weaknesses that may compromise your systems and data.
Once your pen test is complete, you will receive a report outlining any vulnerabilities and giving guidance on how to remediate any concerns.
Our penetration testing service is carried out by a third-party company. In doing your penetration testing through us, we’ll be able to work with you to address any issues following the results.
Endpoint Detection and Response (EDR)
Endpoint detection and response (EDR) is a step up from antivirus.
If you don’t know, and endpoint is a laptop, mobile, workstation, server; essentially any entry-point to your company network.
EDR performs real-time scanning of files and behaviours on an endpoint. It then collects data and analyses this to establish threat patterns. If it detects suspicious behaviour, it isolates the file until it is validated. EDR also includes automated remediation; undoing any damage caused by malicious files.
As EDR continuously scans changes to your endpoint, threats are detected much faster than with antivirus. There’s no waiting for a virus list or a scan to act. EDR can immediately stop malicious behaviour and alert IT teams.
By choosing EDR through us, you also get a detailed timeline of any incident. You’ll be able to view a history of the attack, including every alert. This helps to find the source of an attack to learn from it. Additionally, we deliver a managed EDR service meaning that there are real-life humans monitoring and responding to threats.
Web Browser Security
Web browser security offers you powerful protection across all devices and locations. It stops malware before it reaches your systems.
Regular monitoring of internet activity identifies anomalies and distinguishes patterns. The software will actively block and protect you from bad sites and bot nets. It can also be configured to report on internet usage.
Without proper supervision over the use of USB devices, your business is vulnerable to data theft and the introduction of viruses. A single flash drive can collapse an entire network if managed improperly.
Our USB Control service manages which USB sticks can be used on your devices by registering those safe to use. We recommend you block all USB storage devices if they are not a requirement within your business.
Protecting your business from different cyber security threats can feel overwhelming. That is why we’re here to help you.