Cyber Security Consultancy
Cyber security consultancy follows our Unleashing process which means we spend time listening to you and working out the best available combination of products to give you the best cyber security solution for your budget.
What makes up a cyber security solution?
Like all solutions, cyber security can differ depending on the business and how much protection you require.
As part of our cybersecurity consultancy services, Unleashed would recommend that a cyber solution should include all or part of the following elements:
Anti-Virus or Endpoint protection
Anti-virus (AV) is a must for every device in your business. As AV will stop the majority of computer-based threats such as Adware, Bots/Botnets, Ransomware, and Phishing. There are a number of very good anti-virus software solutions in the market today. However, we do advise against any free version!
Currently Unleashed is recommending Panda, F-Secure, and Webroot, But, any anti-virus is better than none at all.
6 Step Cyber Security Plan
- Asset Identification
- Risk Assessment
- Security Policies
- Compliance
- Disaster Recover
- Cyber Security Report
Firewall or Network Security Appliance
All businesses should have a firewall. A firewall is a hardware or software device that sits at the edge of your network and stops threats from reaching your endpoints. A good Firewall should have software to protect against a number of different threats. This software should have some or all of the following:
Currently, we are recommending three security appliances: WatchGuard, Cisco Meraki, and SonicWall.
Security Information and Event Monitoring (SIEM)
SIEM is normally associated with Corporate and Enterprise organisations. However, there are now solutions for SME and mid-corporate businesses who want to see what threats are around and who is trying to attack their networks. For more information on this, you can visit our Security as a service page.
Email Security
It has been reported recently that 91% of cyber attacks start with a phishing campaign. If they get through your first line then there is every chance they can gain access to your network and do more damage. One way around this is to have an Email security solution. Microsoft recently has included Security and Compliance as part of their office365 offering and we would recommend you have a look at the service to see if it can help your business.