An active collaboration between cyber intelligence operators, and threat detection software. Followed up by the immediate removal, isolation or elimination of a cyber threat.
We deliver a range of activities that combine to fully protect your data from cyber criminals, anywhere and everywhere, on a 247 basis.
Find out why a Network Security Engineer at an organisation of 1,200 employees, with offices all over the world and a large threat profile, calls us his ‘Sleeping Pill’. Discover how we defend another organisations 600 employees, working closely with their IT team of three, delivering world class cyber security at a fraction of the cost of a full time resource.
We can take care of it all:
Speed is of the essence when security incidents occur, making the difference between a minor inconvenience and a major disaster. If we’re already working with you, our incident response time is less than two minutes, which is well below average.
If you’re not an existing client then we can still help, and we’ll respond as soon as you contact us.
Be aware, it’s possible the threat may have been lying undetected in your systems for some time before you discover it.
The average dwell time for a cyber intrusion is 196 days.
It’s important to react decisively, so ensure you have an Incident Response Plan in place. And be aware, the nature of threats are always evolving, so you need to revisit your plan frequently.
The longer a threat is present, the more damage you will experience. Company reputations and billions of dollars have been lost in this way.
Thanks to an ‘economical’ cyber security program, Sony pictures lost all the data on 3,262 computers and 837 servers, with an estimated cost to the company of $118m. That’s 47% of all the computers owned by the business, and 53% of all servers.
Some useful links here:
Cyber-attacks have increased almost exponentially in recent years, and legislation is beginning to catch up.
If you run a business in Australia with over $3M annual revenue you’re now forced to publicly disclose data breaches.
If you’re not compliant in all operating territories, you as an individual could be liable for the breach – and open to legal action.
In Australia there are currently 2.7 breach notifications made public per day.*
Changes to the Privacy Law, Australian Privacy Principles and the new Mandatory Data Breach Notification Laws are difficult to keep up with. Not doing so, however, is not an excuse.
Lawyers and consumers are waking up to the failings of organisations that allow data breaches, and litigation is following.*OIC: Notifiable Data Breaches Quarterly Statistics Report: 1 July – 30 September 2018
Yahoo dodged a bullet in 2017 when they belatedly acknowledged the compromise of 3 billion user accounts, the largest security breach in history at the time. They just missed out on newly introduced GDPR requirements, which would have resulted in fines of between $80M to $160 Million.
Do you know where you’re systems are potentially vulnerable? If you’re not 100% sure, it’s possible your systems have been compromised already.
Our Compromise Assessment service shines a light into the darkness. Revealing the weaknesses and vulnerabilities in your cyber infrastructure. Identifying threats if they’re already lying hidden within your network.
Cyber-criminals’ main weapon is stealth, and we effectively remove it. Then we put a detailed report together, outlining compromised systems, recommending actions to shore up your defences, and identifying what you can do to detect threats.
We know how cyber criminals think, and we know their techniques, so we use that experience to protect you and your organisation.
If you would like your business to undertake a self-assessment to understand if you are protected or not, download our ParaFlare Cyber Security Self-Assessment today.