Gone are the days when a good firewall along with anti-malware and anti-spam software were enough to keep your corporate computer network reasonably secure. The rapidly increasing sophistication and proliferation of cybercrime activity has elevated the threat to your network and data security to alarming levels, with small organizations being targeted as often as large ones.
Ignoring these threats is not a wise choice. Doing so means it’s not a matter of if, but when, you will suffer consequences which could include:
- business disruption
- data corruption
- data loss
- data theft
- lost productivity
- lost profits
- loss of customer confidence
- damaged reputation
- legal issues.
Ongoing Cyber Security Monitoring and Alerting is required to properly address these threats. We offer a number of monitoring options:
Active Directory Monitoring
This includes real time monitoring with email alerts of unusual activity , along with monthly activity reports on your Active Directory Server. Real time alerts allow action to be taken in a timely fashion to resolve or prevent unwanted network activity. Monthly reports detail changes and activity. Failed login attempts, password reset attempts, security group modifications, locked out accounts and new user creations are examples of reported activity. Alerts and reports are reviewed and irregularities are investigated.
File Server Monitoring
Here we track all changes to file objects in folders, sub-folders and shared folders. This includes files/folders created, copied, pasted, deleted, modified, read or permission changed. Real time monitoring and email alerts of unusual activity are part of this service.
Real time monitoring and alerting on unusual activity includes such activities as access rule changes, an administrator login, a firewall re-start and certain traffic spikes. IP addresses identified as having high intrusion attempts can be blocked. Monthly reports detail network traffic, web traffic and much more.
Prior to implementing any of BSC’s Cyber Security Monitoring, an initial Cyber Security Assessment must be completed as a baseline report of the current state of your Cyber Security. Any areas needing remediation are addressed, followed by implementation of the chosen monitoring options.
Today’s security best practices call for ongoing monitoring and maintenance of internal and external security, since networks are ever-changing. What was secure yesterday might be exploitable or have vulnerabilities today.