At least 8 characters including uppercase, numbers and special characters. Being prompted all the time to change your passwords, at least that’s what it feels like, right!? But what difference does your password actually make?
IT security is more than just creating secure passwords, although this is a great starting point and can make a huge difference.
A complete IT security protocol covers strategies to help prevent theft, damage and unauthorised access to hardware, software and data. We provide a full range of services from firewall and anti-virus implementations to full scale IT security consultation and ISO27001 audit preparation.
The benefits to having a thorough IT security strategy through Dead Simple Computing are numerous and worth their weight in gold when it comes to ensuring the safety and integrity of your systems and data.
Anti-Malware covers all kinds of malicious software (hence the name) and most anti-virus programs now cover a comprehensive range of protection to include many of the broader malware risks as well.
Ransomware, trojan horses, worms, dialers, fraud-tools and adware are just a few of the types of malware that can be included under the types of anti-virus tools available.
We can assess your requirement when it comes to these threats and get you fully covered!
Ransomware is getting more and more common and needs to be taken seriously. Ransom threats are becoming ever more advanced and targeted to the point where its no longer a case of if but when!
This is why the best defence against a ransomware attack is having a well implanted and tested Backup and Business Continuity plan that covers all of your critical data. All too often businesses are coming to us when it is too late to recover lost data, they thought their backup was working but have never actually tested it – a backup is only as good as your last restore test!
There is however some decent tools on the market that take it one step above our standard antivirus by using advanced application whitelisting and digital signatures.
Get in touch to find out more – these tools can even cost far less than you might think at around £3 per machine per month.
Patch management is essentially keeping things up to date (running the latest ‘patch’ or version).
This covers both physical hardware, computers, laptops etc. and also software and applications.
We can take the stress of checking, choosing, managing and installing the various updates and new versions when it comes to your IT; both software and hardware.
It can be a challenge to stay on top of this so we take the responsibility so you can focus on more important things!
E-mail is probably one of the most common entry points used by attackers for spreading viruses, sending spam mail and phishing attacks.
It is crucial to ensure that the correct security methods are in place for keeping sensitive and confidential information safe while protecting your accounts from compromise and unauthorised access.
We can consultatively advise the best way to enhance your business’s approach to email security and data protection
ISO27001 also known as ISO/IEC 27001:2013 is the standard that details best practices and processes recommended for ISMS (Information Security Management Systems).
To achieve ISO27001 certification, you must show that you maintain the level of the standard across your security systems.
An external audit is required to pass, however we are qualified to help you prepare for audit and advise where your current security systems are falling short of this international standard.
We are fully qualified ISO27001 auditors and Implementers and know what it takes to get your company certified pain free!
Cyber Essentials is a government backed scheme which allows organisations to become certified in either Cyber Essentials or Cyber Essentials Plus. Both are intended to give you the knowledge and awareness to better protect against cyber threats and show a commitment to cyber security.
This is most relevant for company’s who would like to externally promote their strong security practices for reassurance to customers. Industries like accountancy where customer data is highly sensitive might look to become certified.
Dead Simple Computing can point you in the right direction and support you to put the recommended practices in place as well as keep on top of them going forward.
Also referred to a ‘ethical hacking’ penetration or ‘pen’ testing is the assessment and intentional exploitation of weakness in the IT infrastructure. This assessment is usually performed as part of a wider assessment of the security protocols, including processes and practices, that are in place.
Pen testing is different from vulnerability scanning in that it take place from outside the security ‘perimeter’ and actively takes advantages of vulnerabilities to determine to what extent someone could gain unauthorised access to your systems
Vulnerability scanning looks within the security ‘perimeter’ at systems with known weaknesses.
These are then classified and assessed for the most appropriate and effective countermeasure.
We can provide one off or regular vulnerability assessments and reports depending on your requirements.
We cut through the sales jargon and scare tactics of big brand security software and advise our customers based on what they actually need to either complete their security setup or start from scratch to build one.
A Dead Simple security consultation will take you through the key areas of security that you need to consider and also assess what you already have in place and how this can work better for you going forwards.
Going beyond the setup of these measures, we can also take away the stress of managing the updates, scheduling, scans, testing and reminders that come with keeping on top of a strong security provision.