User and data protection

Most of today’s attacks use an erroneous decision of an ignorant user in the initial phase. Up to 80% of successful attacks are conducted through users. We have selected technologies for you that will help you minimize the risk of danger.

User awarness training

Building information security in a company is a never-ending process that must reflect both the dynamic environment of its own organization and the changing external security conditions. The aim of this process is to reduce the risk associated with human error, ie user error.

Phishing campaigns

  • Revealing the most risky users
  • Your employees will be targeted training
  • Clear report on user reactions to hacker attacks
  • An overview of which your employees go for real attacks

How do we do it?

Our company offers a product of phishing test campaigns to test employees. Our technical specialists will work with you to prepare a simulated attack that is distributed to your employees. We will then find out how many employees will open the email, how many will click on the link or possibly provide their access data. The result of the entire campaign is a clear statistical report.

In addition, our built-in automation provides easy ways to assign targeted training to your users based on these assessments.

Endpoint Security

Users often use a single password across their personal accounts and services, and at the same time use such a password in a corporate environment, where they also expose corporate data to risk. The most common way hackers break into a network is to steal or guess a weak password.

Today’s antiviruses combine next-generation multi-layered threat protection with other proactive technologies such as application, web and device controls, vulnerability management, and EDR-ready endpoint agent data encryption with an extensive set of systems management tools.

Živnost

Which technology to choose?

Each vendor has some special features, but all vendors we select are leading antivirus vendors. For example, Bitdefender and Kaspersky are known to be the best in the fight against ransomware.

We will be happy to help you choose the right one.

Email Security

Email today undoubtedly has the largest share of malware. Therefore, it is important to focus on email security and not rely on users. Analytical security tools use not only known signatures, but also reputation database mechanisms and other algorithms that evaluate the security scores of each e-mail. If the score exceeds the defined limit, it is possible to choose how to handle such an email.

security-265130_1920

Which technology to choose?

We recommend leading manufacturers – Proofpoint, Fortinet or Trend Micro – to protect email boxes. All vendors have products fully compatible with O365.

The e-mail gateway can be deployed as a cloud service or locally. Both products provide advanced multi-layered protection against the full range of e-mail threats. They help your organization prevent, detect and respond to email threats including spam, phishing, malware and zero-day threats, impersonation and Business Email Compromise (BEC) attacks.

Data loss prevention (DLP)

Are you worried about the security of your company’s sensitive data? Are you aware of the risks to which your data is exposed? The DLP system is used by companies that prevent the disclosure of information by their own employees and a hacker attack.

Imagine what would happen to your company if information about trade secrets, data from internal ERP leaked or data about your clients appeared in public?

With DLP, you can easily identify, monitor, and protect data throughout its lifecycle — from creation to archiving or destruction.

How does DLP technology work?

DLP technology can work in multiple locations in a network environment. It works as an agent deployed on endpoint clients or servers, but can also be deployed to control databases and file servers.

Measure data yield via USB. With DLP, it is possible to very effectively reduce this threat without completely restricting USB devices. DLP policy is able to allow some USB to disable others.

Key protective features of DLP against:

  • data transfer via storage media (USB, CD, etc.)
  • uploading company data to cloud storages (Uloz.to, Dropbox, Depository, etc.)
  • transmission of sensitive data via e-mail

Contact us

David Picha

Cyber Security Business Development Manager
+420 604 200 062
ITsecurity@integra.cz