USER BEHAVIOR

No business or organization with a computer network is immune from the threat of data breaches, unauthorized access, and malicious activities performed from INSIDE the firewall.

These attacks do not just take place against large, well-known corporations. While those are the big stories that make the evening news, 60% of all cybersecurity incidents happen to smaller companies.

 

We have a solution that is effective at identifying a wide range of insider cybersecurity threats and generating a daily email alert or internal ticket of anything suspicious it discovers.

 

The scanning technology is non-intrusive, but it does a deep dive through the network in search of anomalous user behaviours, along with unexpected changes to network settings, configurations, assets, and other types of internal threats.

Managed Security Services 

Unauthorised Logins and New User Profiles being added

 

Unauthorized logins is when someone gains access to a website, program, server, service, or other system using someone else's account or other methods. User profiles are then created and access is gained.

New Users and logins

 

It is very seldom that regular users would suddenly gain access rights to the primary domain controller or the datacentre.  This is a visible sign of intrusion.  Any daytime user logging in at an unusual time is a red flag.

Daily Alerts

 

Timely (daily) emails that contain a list of Anomalies, Changes, and Threats prioritized by Severity. Alerts include interactive hyperlinks to start the actions to "remediate" "investigate" or "ignore" the alert.

Examples of typical internal threats that our solution can discover include:

more than 70% of all cybersecurity incidents were the result of internal security issues that no firewall, anti-virus, or malware device could have prevented.

Applications

 

Unauthorized applications get installed onto the locked down system causing a hidden access point. The Software on a printer managed shared, may be a gateway to your network.

Wireless Connections

 

Unauthorized wireless connections to any network create a gateway into your locked down system. 

Protection of information.

 

Sensitive personal data such as credit card numbers, social security numbers and birth dates stored on machines where it doesn’t belong.