Employing the services of an Information Security Officer is critical to ensuring your security policies, practices, and posture remain in-step with the very quickly changing world of digital threats.

SECURE Logo

Security Assessments

Cybersecurity Services Winnipeg

We provide best-in-class security assessments performed by a certified Security Analyst. Our assessments also align with the Center for Internet Security (CIS) framework.

Organizations around the world rely on the CIS Controls security best practices to improve their cyber defenses.

CIS Controls Assessment

The CIS Controls are prioritized, well-vetted, and supported security actions that organizations can take to assess and improve their current security state. But this is not a one-size-fits-all solution. Many organizations cannot address all controls based on limited resources. As a result, CIS has organized the controls into three Implementation Groups. The groups are self-assessed categories for organizations based on relevant cybersecurity attributes. Each group identifies a subset of the CIS Controls that the community has broadly assessed to be reasonable for an organization with a similar risk profile and resources to strive to implement. These groups represent a horizontal cut across the CIS Controls. CIS considers Implementation Group 1 (IG1) to be “basic cyber hygiene” that is a minimum standard which all organizations should strive to meet.

Microsoft 365 CIS Benchmark Assessment

The Security Configuration Benchmark for Microsoft 365 provides prescriptive guidance for establishing a secure configuration posture for Microsoft /Office 365 running on any OS and includes Exchange Online, SharePoint Online, OneDrive for Business, Teams, Azure Active Directory, and in Tune. Assessments are tailored to the type of Microsoft licensing the customer is currently subscribed to based on 4 levels as described below. Many environments have a mix of license types that may overlap into multiple levels. The levels are a guide and not a strict list.

 

Azure CIS Benchmark Assessment

The CIS Microsoft Azure Foundations Benchmark is the security guidance provided by Center for Internet Security for establishing a secure baseline configuration for Azure. The scope of the benchmark is to establish the foundation level of security while adopting Azure Cloud. Assessments are typically performed for environments running virtual machines only and for environments running virtual machines plus SQL server(s). An assessment using all sub-controls may also be selected.

Vulnerability Scanning

A quarterly vulnerability scan helps ensure your organization is following cyber security best practice and helps identify threats that can be resolved before they impact your business. Scans are performed, reviewed and reported on by a certified Security Analyst. A scan is highly recommended prior to renewing your cyber insurance.

Darkweb Monitoring

Are your company’s user credentials on the dark web? Thousands of email addresses, passwords, and other sensitive data lands on the dark web every day, creating risk for your business — and you may not even know about a vulnerability until it’s too late. Dark web credential monitoring ensures the greatest amount of protection with 24/7/365 human and machine-powered monitoring of business and personal credentials, including domains, IP addresses, and email addresses. You will be alerted to compromised credentials in Dark Web markets, data dumps, and other sources, so you can act before cyber criminals do.

Threat Detection & Response

The Challenge

Many small and medium-sized organizations rely on firewalls and antivirus tools to protect their networks and consider it good enough. This “prevention-based” approach works at blocking threats that can be readily identified. Unfortunately, overreliance on prevention exposes the organization to unknown threats adept at slipping past preventative controls, rendering the business vulnerable to a data breach or ransomware attack. In an age where IT teams must anticipate a breach, defense in-depth calls for use of detection-based capabilities for discovery of threats you didn’t know were there.

The Solution

Our threat detection and response team delivers real-time intelligence and visibility into events occurring within your environment. We provide rapid investigation and remediation—all managed 24/7 by Security Operations Center (SOC) staff skilled at quickly discerning what’s real from the white noise of false positives.

Highlights

• Threat detection anomalies and events

• Continuous security monitoring for your network and logs

• Detection and response procedures to reduce or eliminate emerging threats

• Open threat intelligence ecosystem to process threat intel from multiple sources

• Security orchestration to quickly respond to any incident

• Efficient solutions for regulatory and compliance requirements

Endpoint Defense

The Challenge

Hackers are skilled at bypassing traditional perimeter and antivirus defenses on their way to vulnerable endpoints. Once a beachhead is established, they begin their lateral movement tactics towards crown jewel assets. Unfortunately, their malicious intent too often appears as ‘normal’ user activity, rendering organizations with limited detection tools, monitoring and the expertise to discern a real threat from ‘white noise’ at risk of a data breach—or becoming the next ransomware hostage.

The Solution

Our “always-on” endpoint defense delivers enterprise-grade threat detection, incident response, remediation, and the benefits of a dedicated 24×7 Security Operations Center (SOC), so you can focus on what you do best, running your business. As a managed endpoint detection and response service, your environment is continuously monitored for thousands of virus and malware variants including multi-variant ransomware attacks and the latest crypto-mining infiltrations. Designed to rapidly identify the root cause of a threat and diagnose related corrupt source processes and system settings—when malicious behavior is detected, immediate response and remediation measures are initiated on the endpoint including disconnect, quarantine or roll back to an acceptable no-risk state. Threats are contained before they can do harm, and you stay operational. For best-in-class security solutions contact.

Highlights

• Detect and remediate threats early in the threat lifecycle
• Strengthen the protection of critical assets
• Gain the expertise and coverage of a 24×7 SOC
• Remove the cost and complexity of solution deployment and management
• Focus on your running your business

Cybersecurity requires a framework & policies

Book a call to discuss options: