Use cases

ransomware attack

Fighting ransomware

Adopting best practice measures set out in security frameworks, like Cyber Essentials, can reduce the chance of ransomware impacting your business by up to 86%. These security measures help identify any gaps in your cyber defences so you can fix them before being infected with ransomware or other viruses. We have identified three key steps that should be taken to reduce the chances of a ransomware infection

Secure configuration

The National Cyber Security Center states “Manufacturers often set the default configurations of new software and devices to be as open and multi-functional as possible. They come with “everything on” to make them easily connectable and usable. Unfortunately, these settings can also provide cyber attackers with opportunities to gain unauthorised access to your data, often with ease.”

NetFlow for cyber security

NetFlow for Cyber Security NetFlow allows administrators to automate monitoring the behaviour of devices connected to a network. It allows insight into network abuse and anomalies that may represent a threat – such as the spread of malware infection, users attempting accessing known malware sites and providing early indication of hacks and data breaches. NetFlow is a networking feature that was introduced by Cisco in the 90’s and taken up by many others

Perimeter security

Perimeter security is an integral part of cybersecurity frameworks. Standards like ISO27001 and Cyber Essentials help organisations to secure their networks. Perimeter security focuses on controlling connections between network devices. We call these “edge connections”. These are distinct from end-point device connections (often called access ports). “Securing all edge connections is crucial. Without them, unauthorised users could gain access to systems and data, potentially leading to a breach

Detect and Protect IOT

Detect & protect IoT Many companies are adopting new, networked systems like buildings management systems, card access control systems, and industrial control monitoring sensors to improve efficiency and cut costs. Though useful, these Internet of Things (IoT) systems often use very lightweight software that often can’t accommodate traditional security controls designed to deter malware and intrusions. “IoT usage is rapidly growing year-on-year, with 75.44 billion installed IoT devices predicted worldwide by 2025