The Challenge: In What is data security? What your finance firm needs to know Chalkline said financial services firms are 300 times more prone to IT security attacks than other sectors. Average costs of dealing with cybercrime incidents is higher in the financial...
Harry Boyne
Endpoint Device Vulnerability Scanning Assessment
The Challenge: In Remote working: The importance of cybersecurity, we explained how Cyber Criminals always find new ways to tap into networks that may be vulnerable, through tactics such as Phishing emails and scam SMS messages. They can harvest your company’s data...
BitLocker monitoring – protecting devices & data
The Challenge: Cyber criminals are always looking for new ways to access your company’s data. When they gain access to a device, how far would they be able to infiltrate? Which employees have a business need to access your data? The Solution: In our Think ahead –...
Workstation Baselining – keep to security standards
The Challenge: Installing a new device for a new employee? If so, have you set a minimum-security baseline? Cyber Criminals review LinkedIn, looking for profiles where people have recently changed companies. If they target your new employee’s devices, are you...
Third Party Patching
The Challenge: Third Party Apps may be the weakest link in your company’s security. Your devices will run plenty of Third Party Apps - if you look at your programs installed you'll see Adobe Reader, Java, Google Chrome to name a few. With so many different...
365 tenant monitoring – securing the cloud
The Challenge: Breaches can happen at any time. How do you ensure breaches don’t compromise your network? What happens if you accidently stumble across a malicious website, exposing you to malware? How do you prevent, detect and recover from human error? The...
Managed multi-factor authentication
The Challenge: In The Explosive Increase in Ransomware Attacks, Chalkline said Ransomware was by no means new, but with a national lockdown keeping workers away from their usual office environment, Cyber Criminals saw a new wave of unprotected and unaware victims to...
Outbound mail-flow security (DMARC, DKIM, SPF) – reporting to protect impersonation
The Challenge: You receive an email from a client, there is something strange about it. Do you open it? What if your client received an identical email pretending to be from you? Both you and your client open the identical email from the Cyber Criminal, launching...
M365 Backup – it’s now about multi cloud
The Challenge: What if your system crashes and your data disappears or is not acessible? In Remote working: The importance of cybersecurity Chalkline discussed how transferring data across multiple devices makes it vulnerable as increased movement increases the...