IT Management & Cybersecurity Solutions Appendix
Securing and Optimizing Your IT Ecosystem with Proactive, End-to-End Solutions
PSA: Professional Services Automation (PSA) utility streamlines IT service delivery, tracking time, resources, and client interactions. Results include improved efficiency and provides valuable data for analysis, helps identify potential security gaps and optimizes resource allocation for better protection.
ESEC: Email security solutions protect your organization from email-borne threats like phishing, malware, and spam. This safeguards your employees and data from malicious attacks, reducing the risk of security breaches and data loss.
RMM: Remote management and monitoring of entire IT infrastructure, proactively addressing potential issues before a business is impacted. RMM enables rapid deployment of security patches, software updates, and configuration changes that close vulnerabilities often exploited by ransomware.
EDR: Endpoint Detection & Response: Focuses on endpoint-specific data collection, detection, and response. EDR solutions are key to detecting and containing ransomware activity at the endpoint level.
Dark Web Monitoring: Scans hidden online areas for your stolen credentials and sensitive data. Allows us to quickly address leaks, minimizing the impact of potential cyber threats like identity theft.
MFA: Multifactor Authentication: Used for all accounts local / domain / email etc. MFA requires multiple verification methods, making it much harder for hackers to access your accounts even if they steal your password.
Secured Documentation System: Centralized documentation platform that securely stores critical IT information, including configurations, passwords, and emergency contacts. This organized documentation enables faster incident response, streamlined troubleshooting, and improved overall security management.
Application Ringfencing: Creates a secure, controlled environment around specific files or applications, restricting their ability to interact with other parts of your system, preventing malicious files from launching other programs.
Essential Backup: “Your last line of defense against ransomware.” Performed three times daily for email / OneDrive / Desktop / Documents etc. all scanned for malware including ransomware, plus daily bare metal restore backups performed every 12 hours with 90-day retention for all systems. Backups are off-site in two separate secured, encrypted Canadian certified datacenters. **Do not forget the regular scheduled backup recovery tests are a necessity.**
Employee security awareness: Trains and educates staff on best practices for identifying and avoiding cyber threats like phishing and malware that may contain ransomware. A well-trained workforce acts as a strong first line of defense, significantly reducing your organization’s vulnerability to cyber attacks.
Cork Cyber Basic Compliancy: Ensures client remains compliant for the Cork Inc. warranty on all covered devices.
———
Premium Backup: Performed three times daily for email / OneDrive / Desktop / Documents etc. all scanned for malware including ransomware, plus daily bare metal restore backups performed every 2 hours, Mon-Fri, 8AM – 6PM with 1 year retention for all systems. Backups are off-site in two separate secured, encrypted Canadian certified datacenters. **Do not forget the regular scheduled backup recovery tests are a necessity.**
MDR: Managed Detection & Response: Combines EDR technology with expert managed services for continuous threat monitoring and response, including specialized expertise in ransomware incident response and recovery.
XDR: eXtended Detection & Response: Integrates multiple security layers (beyond endpoints) to provide a comprehensive, correlated view of threats and automated response capabilities, including detecting and stopping ransomware that may have bypassed initial defenses.
BitLocker Key Vault Backup: Securely stores recovery keys for encrypted drives. This not only ensures data recovery in case of issues but also prevents unauthorized access to encrypted data, even if the hard drive is physically stolen.
Phishing Simulation: Secondary component for the employees is the simulation designed to test the employee’s ability to recognize and report potential phishing attempts.
Password management utilities and training: Teaches employees how to create and securely store strong, unique passwords for all their accounts. This practice significantly reduces the risk of password-related breaches, a common entry point for cyberattacks.
24 Hour SOC (Security Operations Center) Services: The SOC is our dedicated team that continuously monitors your IT environment for security threats. This 24/7 vigilance allows for rapid detection and response to security incidents, minimizing damage and downtime.
USB Device Blocking: Restricts the use of USB devices, preventing malware introduction and data exfiltration.
Least Privilege Framework: Removes users from Admin group, blocking installation of potentially malicious applications, while still allowing updates of pre-approved programs.
Cork Cyber Enhanced Compliancy: Ensures client remains compliant for the Cork Inc. warranty on all covered devices, and includes working with client’s cyber insurance provider, including enhance reporting and a more thorough regular interaction with the provider. All policy modifications reviewed by SVS, and any changes in security features shared with the client, the broker and the provider if requested.
Optional Add-ons:
Application Allow listing: Only permits approved applications to run, blocking unauthorized software and reducing malware risks.