Clients with greater security concerns should operate at the Silver Standard. The Silver standard includes all the items listed in the Bronze Standard, plus the following:
There are 12 services included in the Silver Standard. Each service is described below:
This refers to the encryption of computers such that a password is required to access the computer when the computer is started. Without the password, the computer is unusable. The standard login password is still required to gain access to the machine.
Even if an unauthorized user gets access to the machine, he/she will not be able to make sense of the data on the machine unless the hacker has the decryption key.
Internet users depend on the DNS to verify the names of websites they want to visit whereas browsers communicate with websites based on their IP addresses. DNS is important because it links the domain name to the IP.
This service provides protection from sites known to contain harmful content. If DNS is not protected, hackers can exploit DNS records and as a result direct users to malicious websites or other harmful malware.
This service encrypts the data on a sever while it is stored on the server (at rest) protecting the data from unauthorized access. Each user must have an account on the network in order to have the data decrypted and selected users can be denied access to the data if it is particularly sensitive.
Encryption at rest provides an additional layer of defense against data breaches such that even if an unauthorized person gets access to the data on the servers, he/she will not be able to make sense of the data without the decryption key.
This is a software that allows mobile devices to be managed such that data is split into personal and business sections on the mobile device. The firm is able to wipe the business data from the phone without affecting the personal data. This is particularly good for firms who embrace BYOD.
Mobile endpoint protection refers to securing end-user mobile devices like phones and tablets. This service provides antivirus and malware protection for end-user phones and tablets.
This service allows users at a firm to send encrypted and confidential email to any recipient. Since email communication is crucial for any firm and oftentimes confidential communication takes place via email, this service ensures that your message is delivered and received in a highly secure manner.
Secure file sharing enables the firm to send and receive files securely and also to work collaboratively with third party. This service also provides more control over synchronization to prevent the excess use of storage on office desktops.
All data is fully encrypted with this service, not even Triella has access to the content of the files saved for file sharing with clients. All data is stored in Canada.
Under this service, Triella provides active management of the firewall appliance in the firm. With the help of the firm, Triella can ensure that firewall configuration and deployment is sufficient to protect the firm’s network and to monitor incoming and outgoing network traffic based on rules set by the Triella technicians. This helps establish a secure shield between a trusted internal network and an untrusted external network and the internet.
It also supposed the blocking of web sites by category (such as Adult and Gaming) or specific URL. Security Appliance Management is constantly evolving to adapt to new threats and prevent unauthorized access to our clients’ systems.
This service provides training for end users along with exercises to help them detect potential phishing emails and social engineering hacks. This includes mock security emails to judge whether your team is learning how to spot fake emails.
This service involves on and off premise protection from spam, viruses and spyware which is transmitted by email. Since email is critical for any business process, it is crucial the firm invests in securing the email system.
Most common viruses and malware originates from malicious (phishing) emails and this tends to an area where users are most susceptible to clicking on harmful links. Our solution ensures that harmful emails are quarantined and reviewed separately so they do not pollute the primary inbox of the users in a firm resulting in smooth business operations.
2FA is the use of a second authentication method to confirm identity when logging on. 2FA involves something you know and something you have – the latter being a cell phone with special software tied to the login of your system. Implementing 2FA prevents a hacker from impersonating a user in order to gain access to their system.
At this time we recommend 2FA only be used when connecting from outside the network. If you are internal, 2FA is not needed.
This software allows a firm to encrypt USB drives and other media. This software helps protect sensitive company data stored on a USB stick. A decryption key is required to access the data on a USB and thus if the key is lost of left in a device, the data is not compromised.
Faraz Mehmood is a Sales & Marketing Coordinator at Triella. We are a technology consulting company specializing in providing technology audits, planning advice, project management and other CIO-related services to small and medium-sized firms. Faraz can be reached at 647.426.1004. For additional articles, go to our blog page. Triella is a VMware Professional Partner, Microsoft Certified Partner, Citrix Solution Advisor – Silver, Dell Preferred Partner, Authorized Worldox Reseller and a Webroot Reseller.
© 2019 by Triella Corp. All rights reserved. Reproduction with credit is permitted.