© 2013 by 365 Managed IT

3100 W Ray Rd, Suite 201, Chandler, AZ 85226

(602) 490-0990

  • facebook-square
  • Twitter Square
  • google-plus-square
  • LinkedIn Black Square

Providing a Complete Suite of IT Solutions

natural disasters

viruses

theft

malware

disgruntled employees

Is your data protected from ______________?

accidental deletions

can be prevented with proper Access Controls such as directory, file and share permission or restored from Backups

corruption

hackers

data can be restored from Backups

attacks can be prevented by using next generation Firewalls with features such as advance threat protection and intrusion prevention, Endpoint Security such as anti-virus and anti-malware, Access Controls including regularly password changes, password complexity and disabling or removing used accounts, Encryption will prevent stolen data from being usable if removed and finally Backups can be used to recover from an attack

hardware failures

systems and data can be restored from Backups

malicious activity can be prevented using Access Controls including regularly password changes, password complexity and disabling or removing used accounts to prevent access, Encryption will prevent stolen data from being usable if removed and finally Backups can be used to recover from an attack

attacks can be prevented by using next generation Firewalls with features such as advance threat protection and intrusion prevention, Endpoint Security such as anti-virus and anti-malware and finally Backups can be used to recover from damage caused by malware

system and data can be restored from Backups stored in the cloud

malicious activity can be prevented using Access Controls including regularly password changes, password complexity and disabling or removing used accounts to prevent access, Encryption will prevent stolen data from being usable if removed and finally Backups can be used to recover systems and data stolen

attacks can be prevented by using next generation Firewalls with features such as advance threat protection and intrusion prevention, Endpoint Security such as anti-virus and anti-malware and finally Backups can be used to recover from damage cased by a virus

What data needs protecting?

 

Customer information

Financial information

Intellectual property

Why protect your data?

 

Mainly because your data is needed to run your organization, additionally certain data types requires protection for complaince reasons

 

Patient information - HIPAA

 

 

 

 

Cardholder informtion - PCI

 

Student information - FERPA

 

Publicly traded companies - SOX

 

Personal financial information - GBLA

HIPAA Compliance Guide
Sophos HIPAA Healthcare Solutions Brief

Where ever your data is located is needs to be protected?

 

cloud

data centers

mobile devices

notebooks

servers

workstations

How to protect your data?

 

Access Controls - Proper management of user accounts, passwords and permission are the first line of defence in protecting your organizations data and should be monitored and audited regularly.

Backups - a backup solution that does full system images which are stored both onsite and and in the cloud provides for quick reliable recovery regardless of the type of data loss, but most important is testing of the recovery process to ensure it works when needed.  Datto's state-of-the-art technology and infrastructure can protect your business from downtime, even if your physical hardware has been destroyed.  Additionally if your business relies on data in the cloud (Google Apps, Office 365, Salesforce) , Datto can protect your critical information from the most likely form of loss: humans. accidental deletions, ex-employees, even malicious activity — Datto backs up, protects and allows you to instantly restore accounts and data so business can return to normal.

Encryption - Today’s users demand a wider and more unhindered access to company data: from mobile devices and home computers to USB sticks and the cloud. Sophos’ data protection solutions protect and encrypt all your devices and data without getting in the way.  SafeGuard Enterprise Encryption is the most complete data protection solution on the market today, protecting data on multiple devices and operating systems. Whether your data resides on a laptop, a mobile device, or being collaborated upon via the cloud or other file sharing method, SafeGuard Encryption is built to match your organizational workflow and processes without slowing down productivity.

Endpoint Security - Secure your Windows and Mac computers against ransomware, advanced persistent threats, viruses, and other malware. Consistently enforce your policies with integrated application control, device control, and web control in the same lightweight agent.  Sophos uses a variety of components—such as behavioral analytics, exploit prevention, and malicious traffic detection—to root out previously unseen threats. The Sophos System Protector is the “brain” that ties them all together, correlating the findings for faster, more accurate malware identification.
 

Firewalls - Advanced attacks are more coordinated than ever before. Now your defenses can be too. Sophos' revolutionary Security Heartbeat™ lets your endpoint protection and firewall talk to each other. It’s a simple yet effective idea that means you get better protection against advanced threats and spend less time responding to incidents. It’s so simple it makes you wonder why nobody did it before.

When to get started?

 

Get started now! 365 Managed IT is offering free Network and Security Assessments for customers interested in finding out how to better protect their data.  These assessments are valued at nearly $1000. However, for a limited time we are offering them to a small number of organizations. There’s no cost to you, the Client and Security Risk Reports are yours to keep, and there is absolutely no obligation to retain our services.  Are you s secure as you think you are?

 

E-mail us now to schedule an assessment

or call us at 602-490-0990

 

Sample Network Assessment Client Risk Report

Sample Security Assessment Security Risk Report