Cyber Protection Services

Fully Automated Fully Comprehensive

When data loss occurs, a well-defined recovery plan is your lifeline. Our Disaster Recovery Planning services encompass comprehensive data recovery strategies, ensuring minimal downtime and rapid restoration of critical systems.

Security Services in Layers​

Ransomware Protection​

The most common cyber-attack is a ransomware attack.

In this attack, the attackers encrypt the information on the business’s computers and demand payment for the release of the information. 

Such an event harms the victim in several aspects:

  • Shutdown of the company
  • Violation of the information privacy of employees and customers
  • Damage to the company’s reputation
  • Waste of time and money to recover.

To avoid attacks of this type, as part of the protection packages, we recommend installing SentinelOne Active EDR on the computers in the organization.

SentinelOne detects a ransom event at the very beginning and stops the attack.

In addition, if some of the information was encrypted before the attack was stopped, SentinelOne can revert the system to its original state, so that you do not have to pay the ransom.

Password Policy​

A set of rules designed to enhance computer security by encouraging the use of strong, unique passwords. It ensures that passwords are hard to crack, thereby keeping your data safe and secure.

Security Awareness​

If you lock your house and set an alarm but do not teach your children not to open the door to strangers, the investment in the door and the alarm will be useless because the child will open the door to a thief.

The same with technological defenses against cyber-attacks.

 no matter what defense technologies you put in place – you must make sure that your employees do not accidentally allow the cyber criminals into the organization.

To significantly reduce the risk of a cyber incident, the first and basic thing is to carry out regular training for employees in the organization and teach them to recognize the potential for a cyber incident and teach them how to avoid it.

Information security awareness is an educational process that teaches employees about network security, best practices and even compliance with standards and regulations.

 A comprehensive security awareness program trains employees in a variety of information technology, security, and other business topics.

These include, among others, ways to identify impersonation and other types of attacks such as social engineering, detecting behaviors of potential malware, reporting possible security threats, monitoring the company’s IT policy and best practices, as well as complying with all privacy regulations.

The proposed employee awareness service is based on short training videos on various topics of cyber, privacy protection and the laws to prevent sexual harassment.

Firewall​

A service that includes operation, administration, monitoring, and maintenance of firewall infrastructure. It provides advanced threat protection and ensures compliance with various mandates.

Cyber Assessment​

The basis for building a defense umbrella for an organization is to perform an examination of weak points, identify loopholes, define needs, and make recommendations to fill gaps between the existing protection and the desired protection.

Information security is required to maintain information confidentiality, information availability and integrity.

010 works according to the methodology of the Israeli Cyber ​​Headquarters with adjustments required for each organization according to its size, nature, geographic distribution, regulatory requirements, relevant threats, and exposures.

The content of the assessment varies depending on the client and his infrastructure and usually includes:

  • Interviews with key people in the organization
  • Database mapping
  • Mapping infrastructure and information systems
  • Mapping processes in the organization
  • Network and systems scanning to identify network weaknesses.
  • Checking the way information systems are used, remote access passwords and more.

At the end of the survey, an executive report describing the current situation and the gap to the desired situation will be produced.

The report will detail the findings and the level of risk for each finding, as well as recommendations for correcting the deficiencies.

The report will be a guideline for the organization to perform necessary actions and repairs to minimize the damages in the event of an attack.

URL Filtering​

A tool that restricts access to certain websites, ensuring a safe and productive digital environment. It prevents access to malicious or distracting websites, protecting your network from cyber threats.

Multi-Factor​ Authentication

A security measure that requires two or more pieces of evidence to verify a user’s identity. It provides an extra layer of security, ensuring that only authorized users can access their accounts. MFA involves factors like something you know (e.g., password), something you have (e.g., OTP), and something you are (e.g., biometric). It enhances the security of digital assets and reduces the risk of unauthorized access.

Security Patching​

No software or operating system in the world is perfect, and from time to time security holes are discovered in the operating systems or software you use. 

When such a loophole is discovered, the manufacturer issues a security patch for the loophole. In the notice about the patch, he also explains what the loophole is and how this patch solves the problem.

The problem is that as soon as a security update is released, the cybercriminals (hackers) know how to attack and specifically harm people who have not installed this security update.

Therefore, as part of our services, we recommend installing a solution that ensures that your computer is immediately updated with every security update, whether the update is for the operating system or whether it is for third-party software that you use.

Mail Filtering​

One of the main ways through which a cyber-attack starts is through email.

According to the FBI, the total losses of companies worldwide during the last three years just as a result of email hacks and impersonation attacks, is estimated at more than 28 Billion dollars.

Adding the email filtering solution provides immediate protection to customers against cyber-attacks carried out through email, some of which are very easy to carry out and very difficult to detect and neutralize.

Examples of email attacks:

  • Phishing and Spear Phishing
  • Email Account Takeover (ATO)
  • Email Account Hacking (BEC)
  • Identity Theft and Spoofing
  • Ransomware

An example of “CEO fraud” is a situation where an impersonating email is sent from the CEO to the CFO with instructions to transfer money to the attacker’s bank account.

The email filtering service uses advanced AI/ML technologies to identify these emails and prevent them from reaching users in the organization.

In addition, a team of experts monitors the suspected emails and makes sure that mail marked as malicious email is indeed malicious (this reduces the burden on your helpdesk in dealing with False Positive).



Examples of email attacks:

  • Phishing and Spear Phishing
  • Email Account Takeover (ATO)
  • Email Account Hacking (BEC)
  • Identity Theft and Spoofing
  • Ransomware

An example of “CEO fraud” is a situation where an impersonating email is sent from the CEO to the CFO with instructions to transfer money to the attacker’s bank account.

The email filtering service uses advanced AI/ML technologies to identify these emails and prevent them from reaching users in the organization. In addition, a team of experts monitors the suspected emails and makes sure that mail marked as malicious email is indeed malicious (this reduces the burden on your helpdesk in dealing with False Positive).

Dark Web​ Research​

Thousands of user details and PII are stolen every day, including addresses, passwords, dates of birth, social security numbers and other personal details that are offered for sale on the DarkNet to the highest bidder and allow the buyer to impersonate you, penetrate private and corporate computers and take control of the computer, the camera and even bank accounts.

In order to defend against this possibility, and as part of our range of services, we operate an intelligence system that combines advanced technology and a human team for our clients to check which of their information has been leaked to the Dark Web and provide them with tools and solutions to prevent and deal with corporate information leakage.

Cyber Insurance​

Cyber Insurance is your financial safeguard in the digital world! It helps businesses cover the financial losses from cyber incidents like data breaches and cyber attacks. With Cyber Insurance, you can bounce back from cyber threats with ease and confidence! 

Cloud Backup​ & Disaster Recovery ​

Various events can cause you to need to restore historical information. 

These events are divided into two main types:

  1. Physical failure – for example: a disk that breaks down, a stolen/lost computer, etc.
  2. Logical failure – cyber-attack, deletion of information, unwanted change of files, human error etc.

In all of these cases, there is damage to your information, and you will have to restore it.

Sometimes the damage is discovered immediately (like a disk failure) and sometimes it takes many months until the fault is discovered (like when a file is deleted/changed).

Therefore our service allows you to recover the information even if months/years have passed until you have discovered that important information was lost.

010’s backup service supports many and varied technological platforms, applications, databases, and devices easily and simply and guarantees your organization maximum readiness for any scenario of logical or physical failure, which may lead to data loss.

010’s managed backup service benefits:

  • A team of experts who proactively check your backup status and prevent malfunctions.
  • Local backup + cloud backup to 2 remote sites
  • AES256 level encryption capability to prevent theft of your information.
  • Long retention – even 7 years or more
  • Ability to restore single items or even the entire system.

MDM​

Master Data Management (MDM) is a method to ensure an organization’s critical data is uniform, accurate, and easily accessible. It creates a single master record for each entity in a business, consolidating data from various sources. MDM solutions automate data governance, management, and sharing across applications. It also involves resolving data inconsistencies, maintaining an audit trail of changes, and requires collaboration between business and IT. It’s crucial for data-driven decision-making in today’s global marketplace.

Encryption​

Encryption is a security method that transforms data into a code to prevent unauthorized access. It uses algorithms and keys to convert original data into an encoded version. It’s essential for protecting sensitive information.

SIEM/SOC​

As you know, cybercriminals do not only work according to the working hours in organizations and many attacks take place at night and on weekends.

On the other hand, as soon as the response team begins to deal with an incident close to its occurrence, the damage can be minimized and reduced.

Therefore, constant monitoring (SIEM) of the systems to identify unusual events in real time,  combined with an intervention team (SOC service) that responds immediately to each event are critical to preventing/reducing cyber damage to the organization.

The monitoring system (SIEM) Perch of Connectwise that we represent is one of the leaders in the field and contains the tests required to detect anomalies in real time.

Our cyber incident response team operates 24/7/365 from the USA and contains intervention teams at all levels for all types of cyber incidents. 

The team knows how to alert and handle all types of cyber incidents.

Skip to content