Security is a big part of what we do for our clients, but what exactly is it that we do? What are we securing? How do we do it?
Here are a few of the areas we focus on when it comes to security.
We use a multi-level strategy to keep individual computers secure for our clients. The first level is control. Control means that we make sure we maintain administrative rights on each computer, and we never give it out to individuals. Our team is always ready to assist you when you need to install or update an application. When we run that update or install that app, we make sure that the files are coming from a safe source.
The next level is anti-virus software. We use anti-virus software installed on each computer to continuously scan the computer for malicious files.
The last level is filtering. We use Cisco Meraki’s Advanced Security features to scan all traffic in and out of your network, and into and out of each computer, to make sure it’s safe.
We put a ton of effort into email security. Phishing is one of the biggest threats to a business and its data. We use advanced threat protection in Microsoft Office 365 to scan each email coming into your inbox. If it looks like a phishing email, it gets tracked and quarantined. This email will never make it to your inbox and you don’t have to worry about it.
No email filter is perfect, so we leverage other layers of protection. One of those layers is SPF and DMARC alignment. This helps us make sure no one is impersonating your domain to send phishing attacks to your users. When an email comes from email@example.com right to your inbox, it’s easy to be tricked into sending that person your credentials thinking it’s a legit source.
People are the biggest vulnerability your business has today. Passwords on post-it notes anyone? Whole Technology will train your users to be the gatekeepers of your data. We send our regular tech tips that focus on security and how to keep company data safe. With your permission, we can even test your employees with things like phishing tests where we’ll send a phishing email out to the company and see who falls for it. We follow up with users who failed and teach them how to identify these types of attacks.
These are just a few of the things we focus on to keep your business secure. Feel free to reach out to us by emailing firstname.lastname@example.org, calling 215-383-2164, or visit us at www.wholetechnology.net