thebiginterview
How does your cloud, network, and app performance monitoring help SMBs improve their efficiency? Tere are various approaches for monitoring performance. And just as with cyber security, some of the language used can be more focussed on the technology than the positive outcomes it delivers. We like to keep things simple and focus on the induvial needs of our clients. We listen to their problems, then address them with the technology we know to have been built with that problem in mind. More recently, there have been advances with some technologies
that mean they can serve multiple purposes way beyond network and application performance monitoring. For example, one of the platforms we provide and manage can also consolidate and prioritise the alerts from your security tools, predict customer trends like when they’re ready to buy, monitor the wellbeing of remote workers, and provide other operational intelligence that matters to the uniqueness of their company.
What is your approach to incident response and recovery? Our approach to incident response and recovery is to help our clients to carefully plan ahead in order to better deal with a damaging attack or breach. Identify and prioritise critical assets. Create a plan and playbook to manage incidents. Identify and train your incident response team. Test your plan with real life scenarios. Create a constructive report of both the good and bad. Te NCSC recommends that companies have a cyber response plan, and for very good reason. It is essential that businesses know what needs to be done, by whom, and how, should an incident occur.
How do you ensure that your products and services are accessible to businesses of all sizes and budgets? Larger companies are usually the first to adopt new technologies, and as with most things over time, the price point becomes more widely accessible. But we think that good, honest advice also needs to be available, and that includes advising clients of what they don’t need even if it’s something we do provide. We put a lot of emphasis on the simplification of the language we
use. It’s important to us that people don’t feel disenfranchised about cyber security, particularly as cyber-crime can affect us all. Many can easily feel confused and intimidated by the world of security, and we make sure we speak the same language as they do, and avoid jargon to ensure answers to security and cyber-crime are accessible and understandable. We have been working in this field helping major network
owners to build, manage and monitor since 1984. Tis was before cyber-crime became as prevalent as it is today. System needs and threats have continued to grow and so have we. Tis means we have a holistic understanding of networks as well as the application of tools and systems. We take our experience and learnings from large organisations and networks and bring it into smaller companies.
Can you share a case study or two? One of our clients, a professional service company, came to us with two problems they needed help with. Firstly, they needed their cyber awareness to be better across the organisation, and secondly, they wanted cyber insurance. In order to secure cyber insurance, they had to demonstrate that they have a staff cyber awareness
www.pcr-online.biz March/April 2024 | 19
“The attackers want to get in and extract and encrypt this data, demanding that the company pays them a ransom for the release of the data.”
program in place. We provided them with cyber awareness training and testing which helped to improve their security posture and increased awareness across the company. Tis also meant that they now had what they needed to satisfy their insurer’s needs, ultimately solving both their problems. A different client, a small independent utility supplier, was
looking for a way of migrating from traditional VPN to a more robust secure remote access strategy. For this we provisioned, and now manage their Zero Trust Network Access platform. Zero Trust assumes that all connection requests have hostile intentions, so lets you choose your own authentication policy way beyond VPN’s username and password. You can be as granular as only allowing access during certain hours, on known devices carrying the latest version of your Endpoint Security soſtware, with the user being up to date on their cyber awareness training. We took away the pain of installation, maintenance, and running of it, ultimately providing them with a higher level of security and protection, without overcomplicating or adding to their workload.
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52