Security Layers
Learn more about how Christo IT protects your firm.
Included Security Protections
-
Zero Trust / Application Whitelisting
A security solution that allows organizations to specify what software is allowed to run on their systems in order to prevent any non-whitelisted processes or applications from running.
-
Employee Awareness
Training programs that are designed to increase employees’ security awareness. For example, programs can focus on how to identify potential phishing emails.
-
Endpoint Protection (EDR / XDR)
Software installed on individual computers (endpoints) that uses behavioral and signature-based analysis to identify and stop malware infections.
-
Security Info & Event Management (SIEM)
The system that is used to aggregate, correlate, and analyze network security information – including messages, logs, and alerts – generated by different security solutions across a network.
-
Office 365 / Sharepoint Backup
Backup of Microsoft’s default 30-day repository is essential in compliance and security concerns regarding rogue employees
-
Change Management
A known baseline is taken for all users, privileges, settings, firewall rules, and more. Any changes to the baseline configuration are logged and alerted for any escalation of privilege.
-
Asset Inventory
A list of all IT hardware and devices an entity owns, operates, or manages. Such lists are typically used to assess the data being held and security measures in place on all devices.
-
Custom Threat Intelligence
The collection and analysis of data from open source intelligence (OSINT) and dark web sources provide organizations with intelligence on cyber threats and cyber threat actors pertinent to them.
-
Server Encryption
Where sensitive data is encrypted while it is stored on servers. If implemented correctly, this can stop malicious actors from being able to read sensitive data if they gain access to hardware.
-
Data Loss Prevention (DLP)
Software that can identify if sensitive data is being exfiltrated from a network or computer system.
-
DNS Filtering
A specific technique to block access to known bad IP addresses by users on your network.
-
Email Filtering
Software is used to scan an organization’s inbound and outbound email messages and place them into different categories to filter out spam and other malicious content.
-
Intrusion Detection / Prevention System (IDS/IPS)
A security solution that monitors activity on computer systems or networks and generates alerts when signs of compromise by malicious actors are detected.
-
Incident Response Plan
Action plans for dealing with cyber incidents to help guide an organization’s decision-making process and return it to a normal operating state as quickly as possible.
-
Multi-Factor Authentication
Where a user authenticates themselves through two different means when remotely logging into a computer system or web-based service. Typically a password and a passcode generated by a physical token device or software are used as the two factors.
-
Network Monitoring
A system utilizing software, hardware, or a combination of the two, constantly monitors an organization’s network for performance and security issues.
-
Perimeter Firewalls
Hardware solutions used to control and monitor network traffic between two points according to predefined parameters.
-
Web Application Firewall
Protects web-facing servers and the applications they run from intrusion or malicious use by inspecting and blocking harmful requests and malicious internet traffic.
-
Web Content Filtering
The filtering of certain web pages or web services that are deemed to pose a potential security threat to an organization. For example, known malicious websites are typically blocked through some form of web content filtering.
Additional Security Items available upon request – Additional Fees will apply
-
Certified Internal and External Penetration Tests
This test is a comprehensive security assessment simulating real-world attacks on your company's network, systems, and applications. It is conducted by our team of certified security professionals who attempt to exploit weaknesses in your company's defenses using various tools and techniques. The test results provide you with a clear understanding of your security posture and recommendations for remediation.
-
External Vulnerability Scan
This security assessment process identifies vulnerabilities and weaknesses in an organization's external network infrastructure. It involves using automated tools to scan the organization's internet-facing systems, such as websites, servers, and applications, to detect any security weaknesses that could be exploited by hackers or other cyber threats. This scan aims to identify potential security risks before they can be exploited, allowing the organization to take preventive measures and protect its network from external threats. The results of the scan can also help the organization comply with regulatory requirements and industry standards for security and data protection.
-
Cyber Security Application Review
A comprehensive assessment of your cybersecurity policies and procedures to ensure they align with your objectives and the evolving threat landscape. It involves evaluating policies related to data security, access controls, incident response, third-party security, and other key areas of cybersecurity to identify gaps and inconsistencies. The review includes recommended changes to policies and procedures to improve the organization's cybersecurity posture.
-
NIST Security Framework-Based Risk Assessment
This assessment is a structured approach to identifying, assessing, and managing cybersecurity risks within your network. It is based on the guidelines and best practices set forth by the National Institute of Standards and Technology (NIST) Cybersecurity Framework and involves identifying critical assets and systems, evaluating potential threats and vulnerabilities, and identifying appropriate controls and countermeasures to mitigate risks. Our team of cybersecurity professionals conducts the assessment, and the results are documented in a report that includes a risk management plan.