IT Security

Emergency Breach Response

If you suspect you have suffered an IT breach, or know you have, and you are looking for urgent assistance to remediate the issue then please:

a) Don’t Panic (See the Do No Harm article in ‘Resources’)
b) Call us straight away, we can help.

Things to look out for after common breach scenarios:

  • Rules or Forwards configured on email accounts to unknown external email recipients.
  • Bad Actors attempting to monetise the breach, ie discovering invoices in sent items and editing these invoices and resending to your customers with updated/changed bank details.

Prevention Services

All organisation should be prepared for “when” their organisation has an IT security issue not “if”.  With suitable preparation you can minimise what and IT breach looks like, how quickly you become aware of the breach and most Importantly know how you will respond.  Combined this will limit opportunities for bad actors to do damage to your brand, organisation and bank balance.

We assist organisation of all shapes and sizes with implementing a solution that is suitable for them.

Reach out if you would like to have a chat about this or any or the items listed below.

Basic Measures everyone should be following:

  • Patch all systems, then bad actors have to find new exploits rather than reuse known exploits.
  • Enabling 2 factor authentication everywhere it is supported.
  • Ensure you have backups that follow the 3-2-1-0 rule

Best practice measures for all organisations:

  • Disable Office Macros and remove unused applications
  • Secure privileged access. Ie LAPS
  • Make sure you use and correctly configured security devices like firewalls and Antivirus.

We also have a range of advanced security options we can help you implement not outlined here.

Penetration Testing

Penetration testing is a highly specialised area and that is not what we do at Techtegrity.  However, we do work hard to ensure your environment is secure as possible.  We can also assist you in building highly secure environments where required.  Having witnessed a number of penetration tests and real life breaches, securing your IT environment can be broken down into three parts.

  1. Implement all security controls as practical.  Ie start with ACSC Essential 8, LAPS etc (Call us for info on advanced solutions).
  2. Hire trusted ethical hackers (Penetration testers) to test your environment.
  3. Resolve any issues the penetration testers identified.

We can assist with 1) and 3) and are happy to refer you some great security consultants (Penetration testers) we know for 2).

To get the most value out of your penetration test, call us first so we can help you identify and resolve all the common faults and implement best practice before you get tested.  This way you will realise the most value for money from your penetration test.

Do you need proven business IT solutions?