Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Customer testimonials and case studies.
Stories on cyberattacks, customers, employees, and more.
Cyber incident, analyst, and thought leadership reports.
Demonstrations, seminars and presentations on cybersecurity topics.
Information and solution briefs for our services.
MITRE ATT&CK Framework, Cybersecurity Assessment, SOC Calculator & more
You know how the saying goes: “New year, new you.” Whether or not you apply that to your personal life, you should definitely consider applying it to your business’ cybersecurity strategy. If last year was any indication, the world of cyber-attacks and cyber threats is only going to heat up – and you and your business needs to be ready.
So, in light of the New Year, we’ve rounded up six “resolutions” for you to consider as part of your 2018 cybersecurity strategy.
IoT devices can be exploited to leak sensitive information or used to launch unprecedented and highly disruptive attacks. In smaller workplace environments, these types of devices often get added to the network without much thought. The simplicity of putting everything on one network makes things easier, and we get that. Unfortunately, there is risk involved with this practice.
It’s important you understand the requirement of each of these devices and can implement a security posture for how they are used. Similarly, ensure that all security infrastructure is running properly. This includes firewalls, antivirus and any other security features—all of which should receive regular updates.
By default, users are a weak point in your cybersecurity strategy. Unfortunately, there is no way to completely eliminate this risk, but there are steps you can take to reduce it. A good place to start is with teaching your employees to be wary of suspicious emails.
Include Security Awareness Training as part of your quarterly routine. It’s important to remember that employee education will reduce the risk of a cyber breach; however, it won’t stop criminals from trying. Providing ongoing education and training to employees is the best way to protect your business in the fight against cybercrime.
Passwords need to be complex and hard to guess, but not so much so that you can never remember them. One thing we’d recommend is “passphrases.” To make these, simply come up with a phrase you can remember and then make a password from the first letter of each word in the phrase.
It’s important the employees are required to change passwords regularly and know not share passwords across accounts or network devices. Of course, when possible, they should be using two-factor authentication.
In the possibility of a natural disaster, what’s your business continuity plan? Is it well known among your employees?
Emergency situations are naturally very chaotic. This can mean an increase in the likelihood of sensitive data being accidentally leaked. Amid confusion, employees are unlikely to place high priority on information security, yet these are precisely the moments cybercriminals may choose to test your cybersecurity defenses in creative and relevant ways. Now is the time to re-evaluate your BCP and ensure backups are regularly preformed.
An important part of good cybersecurity hygiene includes knowing your strengths and weaknesses. As part of this, vulnerability scanning should be done on an ongoing basis – say monthly or quarterly, and penetration testing done as a yearly checkup.
A vulnerability assessment allows you to prepare for a penetration test, and a penetration test allows you to prove you’re acting on any vulnerabilities, so it’s critical that a vulnerability assessment is performed (and identified vulnerabilities remediated) before any penetration testing is initiated.
There is a lot of misunderstanding around what people should and should not do/post on social networks. Before putting something online, you should ask yourself: Does this need to be public? Is it worth the risk? Not only is what you share online available to friends and family, but it’s also available to cybercriminals.
These cybercriminals—or hackers—present both physical and virtual threats. The bad guys can use your social networks to gather user behaviour habits, like where you live and when you’re home. They can also access personally-identifiable information like birthdays, which can be used to facilitate fraud and identity-theft. That said, commit to being smart about what you put online in 2018.
eSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization’s cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world’s most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire's award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit: www.esentire.com and follow @eSentire.