Services
Information Security ServicesCyber Threats come in many shapes and forms and are countered with an equally comprehensive array of tools and techniques.
Where attacks used to be made directly through Operating System exploits, the trend now is to find weaknesses in common applications installed on a computer network or individual computer and use these as a method of penetrating IT systems.
Microsoft users often bemoan ‘Patch Tuesday’, that occurs on the second Tuesday of each month in North America, on which Microsoft regularly releases security patches. Starting with Windows 98, Microsoft included a “Windows Update” system that would check for patches to Windows and its components. In October 2013, Patch Tuesday celebrated its ten-year anniversary of patches and updates. Microsoft has always been a favourite of crackers* to hone their skills hence the constant stream of updates and security fixes. Auto updates take away some of the pain of updating, but auto-updating has its drawbacks – especially when you are in the middle of a project and your computer arbitrarily closes down for its auto-update cycle1
Attacks vary in scope and maliciousness; a recent variant of Ransomware Virus was released worldwide that, once inside your computer system, encrypted all of your files’ with the only option of regaining access being to pay the ‘ransom’ demanded by the instigator.
As attacks become more sophisticated and the consequences more financialy devastating, it is vital that companies take all steps necessary to ensure tight and robust security measures surrounding their data. ISO 27001 is a route to proactive data security, but must not be regarded as the be all and end all of protecting your data. All it takes is a minor lapse of concentration by a company member to unleash terrible damage to your IT and data infrastructure.
Keeping up with the latest in cybercrime detection and prevention is a time-consuming and costly business, but if you do not then the consequences could be disastrous for your business.
That is why Isscom exists; to help businesses create a secure and safe environment to maintain their business continuity.
You can recover from a fire or stock loss, but if you lose your data, your company will surely perish.
Consult Isscom, the experts in IT security and disaster planning; we will help you formulate a plan to help you avoid cyber pitfalls – and when the inevitable does happen and data is lost, ur data backup and recovery services will be there to help you to get back up and running as soon as possible.
*A cracker (also known as a black hat hacker) is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security or gain access to software without paying royalties. The general view is that, while hackers build things, crackers break things. Cracker is the name given to hackers who break into computers for criminal gain; whereas, hackers can also be internet security experts hired to find vulnerabilities in systems. These hackers are also known as white hat hackers. Crackers’ motivations can range from profit, a cause they believe in, general maliciousness or just because they like the challenge. They may steal credit card numbers, leave viruses, destroy files or collect personal information to sell. Crackers can also refer to those who reverse engineer software and modify it for their own amusement. The most common way crackers gain access to networks or systems is through social engineering, whereby the cracker contacts employees at a company and tricks them into divulging passwords and other information that allows a cracker to gain access. (Source – PC Tools)