Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore cybersecurity ebook 2020

cybersecurity ebook 2020

Published by jonabelle.ong, 2020-09-30 23:23:47

Description: cybersecurity ebook 2020

Search

Read the Text Version

Cybersecurity [email protected] +852 2915-5096 www.velocity-technology.com

CONTENTS 3 4 What is Cybersecurity? 5 Penetration Testing 6 Cybersecurity Review 7 Breach Detection Solutions 8 Security Awareness Trainig 10 Fully Managed Firewalls 11 Business Conntinuity Solutions Endpoint Detection and Response

CYBERSECURITY Cybersecurity is critical to business and involves the protection of IT systems and data from cyber threats such as computer- assisted fraud, espionage, sabotage or vandalism. Benefits of managing cybersecurity? • Protect networks and data from unauthorized access • Improved information security and business continuity management • Improved stakeholder confidence in your information security arrangements • Improved company credentials with the correct security controls in place • Faster recovery times in the event of a breach How Velocity Technology can help As your Cybersecurity partner, we work with you to understand which cybersecurity services will best suit your organisation. Velocity has IT experts who will test your infrastructure and we have a vast array of solutions that can address your requirements. LIVE THREATMAP! CLICK HERE! www.velocity-technology.com

PENETRATION TESTING Security is a must for one of the following What we do? What’s included? reason: investors, regulators and your own peace of mind. Why penetration testing is important? This What we do? will help you to identify your network security weaknesses and making sure that your Velocity Technology can arrange for a cybersecurity is working. comprehensive penetration test of your computer network. The security experts we use have over a decade of experience in the Sophisticated investors are now asking field of ethical hacking, digital security, IT about penetration testing in Due Diligence Questionnaires. Regulators such as the SFC, risk management and IT audit. They hold MAS and SEC regularly ask about penetration internationally recognized security certifications tests in their questionnaires and audits. Your such as CISSP, CISA, GCIA, GSNA, GWAPT, fund needs peace of mind to know what CEH and maintain their independence. They security issues are present in your network, can also leverage on their international ethical and if they can be used by a hacker to gain hacking experience obtained in the United entry. You don’t want to suffer your reputation States, Asia and Europe. by letting those cyber criminals get into your network and exploit your important The objective of the penetration tests is information or what we call data breach. to determine, and potentially exploit, the vulnerabilities in your computer network. Penetration testing will help you to moderate Velocity’s penetration testing services can the threats that your business may encounter. include some or all of the tests to assess all aspects of your company’s network. www.velocity-technology.com

CYBERSECURITY REVIEW Cybersecurity review is also vital to an organization to be protected from cyber threats. One important question to ask is “How secure is your network and how will you know?” With Cybersecurity review, this will help your organization to identifies how safe is your computer network and gives you the best solutions to improve your current state of your computer network security. This will include running different software tools to test your physical network and gather all the information needed, this will also include analyzing the current IT policies and procedure of your physical network. An IT Review report will be discussed to you in details that includes any recommendations to improve the security and functionality of your computer network. In this case, you will improve your cybersecurity state as well in the future. What’s included: • Velocity provides you with an independent report on the state of your computer network. • Our IT experts will examine the current state of your network and document the hardware and software on your network using specialist software tools. The aim of this review is to identify any areas that will affect the security and reliability of your computer network and provide you with an independent review of your IT systems. The Velocity Cybersecurity Review will be conducted in accordance with best practices and consists of the following phases: Infrormation gathering Data Aggregation and Presentation of Report Preparation IT Review Report Information gathering Our engineers will use a range of software tools during our initial site visit to gather all the details we require. We also analyse your current IT policies and procedures and conduct (as well as document) your physical network and note any IT issues that are present. www.velocity-technology.com

BREACH DETECTION SOLUTION A data breach is the intentional or unintentional The Velocity Breach Detection solution release of secure or private/confidential provides a managed appliance that looks like information to an untrusted environment. a server on your network. One of the first steps Individuals and organizations are being a hacker or malicious insider takes is to probe attacked on a daily basis by cyber criminals your network and attempt to learn what is and hackers. Will you know when an intruder connected and how. When an intruder probes will attack your network? Or worst they are the appliance, the Velocity 24x7 helpdesk already inside your network. Will you be will receive an alert that someone is trying to ready for this kind of incident? This is why access files on your network. it is important to have a Breach Detection Solution to get protected from this cyber If you do not have a breach detection solution, criminals and hackers. This will not only help how will you know if there is an intruder on your your organization protect your confidential network? information but also protect your business time, money and reputation. Did you know? The Velocity Breach Detection solution provides high quality, In a recent report from Mandiant (the global actionable alerts on where a breach consulting arm of FireEye) they stated that has taken place on your network. while businesses in the United States will Velocity provides 24x7 monitoring detect a hacker in their networks within via our helpdesk and you will be 4 months (which is in line with the global alerted if there are any attempts average), it takes 17 months for those in the to probe the Breach Detection Asia Pacific sregion to notice they have an appliance. intruder. www.velocity-technology.com

SECURITY AWARENESS TRAINING What’s Included? Features Cybercrime has turned professional. Now more than What’s Included? ever, your users are the weak link in your network • Baseline Testing security. Your users need to be trained and then stay We provide baseline testing to assess the Phish-prone on their toes, keeping security top of mind or else your company will become a victim of ransomware and/or percentage of your users through an initial simulated your company’s data will be stolen, altered or deleted. phishing attack. Effective security awareness training is usually hard. • Train Your Users Today internal IT teams don’t have the support, time, Live training from Stuart Sanders (Executive Director), or resources they need to be successful and/or are On-demand, interactive, engaging training with missing the skills and experience to effectively engage common traps, Kevin Mitnick video demos and new and train their organization. Velocity Technology has scenario-based Danger Zone exercises. partnered with the world’s most popular integrated • Phish Your Users Security Awareness Training and Simulated Phishing Fully automated simulated phishing attacks, hundreds platform. Our training program streamlines the process of templates with unlimited usage, and community of training your staff and helps your organization phishing templates. Velocity Technology will design become more conscious of network security. and manage Hong Kong (and other regional) themed The Velocity Technology Security Awareness Training simulated attacks. program includes live training from Stuart Sanders • See The Results (Executive Director) who has run Cybersecurity Enterprise-strength reporting, showing stats and seminars for HK asset managers in conjunction graphs for both training and phishing, ready for with leading HK investment banks and compliance management. Show the great ROI! companies. Stuart is currently running Security • Discussion of Results Awareness Training for a number of HK asset Discussion with Velocity Technology Consultants managers. during our regular Management Meetings or Security We can also customize the Phishing Campaigns for and Risk Meetings. multiple languages. www.velocity-technology.com

FULLY MANAGED FIREWALLS Protect Your Network with The Velocity The security features provided by the Fully Managed Firewall Service Velocity fully managed firewall service include: The Velocity Fully Managed Firewall Service is designed to protect your network with a solution that provides the latest firewall • Gateway Antivirus to examine equipment. Our firewall service is monitored 24 x7 and incoming traffic for viruses and continually updated by engineers in our Hong malware Kong and Philippines offices. • Intrusion Prevention to protect A firewall is a vital part of your computer against known threats and zero- network and is your defence from Internet day attacks including malware and attack. A firewall system is an item that underlying vulnerabilities cannot just be installed and then forgotten • Application control to prioritise about. Customers that do this “set and forget” specific application traffic and block approach are exposing their network to a or throttle traffic from some sources multitude of hacker attacks from the Internet. (eg. BitTorrent, Spotify, Youtube Badly configured and non-updated firewalls are some of the most common vulnerabilities that appear in penetration testing of networks etc.) that we do for clients. Having a poorly • Web search filtering to filter out configured or out of date firewall is the equivalent of leaving your office door unlocked. offensive websites and search results • Antispam - provides a comprehensive and multi-layered approach to detect and filter spam • Sandboxing to safely examine potential threats before they pass through the firewall The Velocity Fully Managed Firewall Service is available as a quarterly subscription that includes the firewall hardware and a fully maintained and monitored service. www.velocity-technology.com

Benefits of the Velocity Firewall Service • Monitored 24x7 service by our engineers • Velocity provides you with a Highly Available firewall solution for a monthly subscription that enables you to pay for your firewall system as an operational cost rather than a large capital expense • Using a firewall service minimizes your costs relating to ongoing costs including hardware updates and the time involved for your staff being trained on firewalls and involved in the ongoing firewall selection, maintenance and support processes. • Rather than a large upfront fee you can pay a quarterly fee and have the security and peace of mind of a fully maintained and monitored firewall service. • Reports are emailed to you every month detailing the monitoring of your firewall service and summaries of activity for the month. Getting the Right Firewall for your Business Velocity will provide you with an appropriate firewall system that gives you the ongoing protection that is essential in today’s Internet connected world. Our managed firewall solution is available in two forms: • Standard Solution – This managed service includes a single managed firewall with 24x7 monitoring. • High Availability Solution – This service includes two firewalls set up in a High Availability mode to ensure that you have firewalled Internet connection(s) even in the event of a failure of one firewall device. We highly recommend the High Availability service that provides dual firewalls to assist in keeping you connected even in the event of an issue with one of the firewalls. www.velocity-technology.com

BUSINESS CONTINUITY SOLUTIONS There are a number of disasters such as major computer hardware failures, office fires, water leaks etc. that can have a massive impact on your business. You will be exposed to days of downtime for your computer systems if you have to rely on conventional backup solutions. If you are still using tape backups, there are statistics showing that 50% of all tapes fail when you try to restore from them. Thankfully, there is a way to protect your business - The Velocity Business Continuity solution. • Velocity has a solution for your servers and critical workstations that will enable you to be back up and running quickly after most disaster scenarios. • Our solution will enable you to launch a virtual server or workstation from a recent backup (as recent as 5 minutes ago). This Virtual Machine can be launched from a backup appliance in your office or at our datacentre, or even from a regional secure cloud service. • This means that you could have a major computer hardware failure, an office fire or other disaster and you will still be able to access your data due to the features of our solution. Being prepared when disaster strikes will mean the difference between staying in business or having to shut down operations due to non-functioning computer systems. The Velocity Business Continuity Solution keeps your business running even after a disaster! www.velocity-technology.com

ENDPOINT DETECTION & RESPONSE This solution installs an agent that inventories each of your applications that are scheduled to automatically start at boot-time or on user login (persistent applications). Metadata on these applications are sent to an Analysis Engine for inspection. The Analysis Engine aggregates data from the installed agents and uses algorithms to discover malicious outliers (footholds) in the dataset. Each persistent application is evaluated using a combination of file reputation, frequency analysis, and other proprietary algorithms. When an anomaly is detected this solution delivers prioritised remediation recommendations – not alerts – to you and all other affected members within this solution’s community. www.velocity-technology.com

APPLICATION WHITELISTING An application whitelist is a list of applications and application components that are authorized for use in an organization. Application whitelisting technologies use whitelists to control which applications are permitted to execute on a host. This helps to stop the execution of malware, unlicensed software, and other unauthorized software. www.velocity-technology.com

INCIDENT RESPONSE PLAN An Incident response plan helps the IT team to be prepared, identify, eliminate the malware and recover from cyber attacks. This will also help the organization to prevent follow on attacks or similar incident in the future. This plan is recommended by SANS Institute, a private organization, which provides research and education on information security. They are the world’s largest provider of security training and certification, and maintains the largest collection of research about cybersecurity. Below are the 6 steps of an incident response plan: IDENTIFICATION ERADICTION LESSON LEARNED PREPARATION CONTAINMENT RECOVERY Preparation—review and codify an organizational security policy, perform a risk assessment, identify sensitive assets, define which are critical security incidents the team should focus on, and build a Computer Security Incident Response Team (CSIRT). Identification—monitor IT systems and detect deviations from normal operations, and see if they represent actual security incidents. When an incident is discovered, collect additional evidence, establish its type and severity, and document everything. Containment—perform short-term containment, for example by isolating the network segment that is under attack. Then focus on long-term containment, which involves temporary fixes to allow systems to be used in production, while rebuilding clean systems. Eradication—remove malware from all affected systems, identify the root cause of the attack, and take action to prevent similar attacks in the future. Recovery—bring affected production systems back online carefully, to prevent additional attacks. Test, verify and monitor affected systems to ensure they are back to normal activity. Lessons learned—no later than two weeks from the end of the incident, perform a retrospective of the incident. Prepare complete documentation of the incident, investigate the incident further, understand what was done to contain it and whether anything in the incident response process could be improved. www.velocity-technology.com

Velocity Technology is the right choice as yourGET IN TOUCH technology partner as we cover all areas fromWITH US! secure computer network design through to implementation and managed support. As new technologies are established, Velocity Technology will design IT systems that enable you to leverage technology to make your business perform better and enhance productivity for all your staff, wherever they are located. Contact us today to find out how we can help your company to be more secure and effective. [email protected] +852 2915-5096 www.velocity-technology.com


Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook