Advanced Security Categories
Having a USB Flash drive is not a good backup. Ransomware will infect your files, and immediately infect any files for a device you plug in. Backups should be encrypted, and cloud-based to ensure you have a good rollback.
ACTIVE USERS WITHOUT EXPIRING PASSWORDS Attackers exploit leaked passwords to gain network access. Stale passwords jeopardize the network to breaches and attacks and are completely preventable through an enforced password change policy.
Ensure all Windows and Security Patches are up to date. Hard Drives that are full will also cause potential errors in the near future, as well as the ability to download the most recent security patches.
Ensure all unnecessary ports are closed down. Ports like 3389 are frequently open and do not need to be. This is a port used by many hackers to deploy Ransomware.
Basic or Free Antivirus will provide you with a minimal level of protection. Advanced Antivirus with EDR is needed to both protect from an outbreak, but also to trace where it came from, and what files were affected.
Alerting should always be configured for all Antivirus and Firewall applications to ensure that attempts, both successful and unsuccessful to ensure you know when attempts are made
Ensure that Sensitive Data cannot be sent via cloud file sharing applications. Ensure any file sharing application used has proper security controls.
Educate all the users to know what to share, how to share, and the importance of security.
Accounts used for daily work should never have Administrator access. Create an unlicensed Administrator account and login with a Private browsing session for any administrative functions.
All hard drives and removable media should always be encrypted. This will protect you if the hardware gets in the wrong hands.
Penetration Test-Reasoning / Methodology
Do you know WHY users are your biggest cybersecurity threat?
Because studies show that 91% of ALL cyberattacks start with a phishing email. This puts the hacker right inside your organization.
Our team uses a proprietary (patent pending) process to go beyond phishing training and find out what a hacker can gain access to when someone in your organization is phished.
Considering over 90% of cyberattacks begin with a phishing email and over 19.8% of employees click phishing email links, our team focuses on what the attacker will gain access to if a normal user were to click a link.
We target employees who are the most likely to be phished. These employees also happen to be the ones who have the most to lose: CEOs, CFOs, Directors, HR and sales team members.
Why are they more likely to be phished in the first place?
They are often communicating with people outside your organization AND they process many more emails than others.
What about the other 9% of attacks, how do they get started?
Hackers build sophisticated automation that is constantly scanning the internet looking for vulnerabilities. They use these vulnerabilities to get into networks. Galactic Advisors uses some of the same tactics to outline the perimeter of your organization, look for exposed services, find vulnerabilities, and attempt to exploit them
The following report contains evidence of our findings, remediation steps, as well as descriptions of the risks associated with them. Hackers are constantly coming up with new attack chains and vulnerabilities. These new methods need to be evaluated and remediated often. Best practice includes regular ongoing security assessments to identify and respond to these new threats.
Train employees to recognize Phishing Attempts
Stop employees from rolling out the red carpet for hackers
Sandra Network provides in depth Testing of all aspects of your network, and then works with you to remediate the findings.
- Ensuring your data is secure is part of any Advanced Security Plan, but do you know the difference in backups and restore times?
- Image based backup vs File Based backup?
- Is your Cloud based Office 365 or G-Suite backup covered?
- If you get hit with Ransomware, you will want to know the difference to ensure you are up and running as soon as possible.
IT Security Policy Checklist
Acceptable Use Policy
Incident Response Policy
Security Awareness Policy
Backup and Disaster Recovery Policy
3rd Party Access Policy
Data Confidentiality Policy
Business Continuity Plan
I don’t know if we have any of these
Mobile Device Policy
Remote Access Policy
User Termination Policy
Bring Your Own Device Policy
IT Asset Disposal Policy
Removeable Media Policy (USB Drives/Sticks)