Threat and Vulnerability assessments

By: BBS IT Associates  05/05/2015
Keywords: data recovery, IT consultancy, network security

Companies and organisations face growing threats from specialised attacks used whether from organised criminal gangs, terrorism or other groups that set out to compromise or disable capability. This can mean stealing IP, compromising high-value data and phishing. We provide services that analyse these targeted, highly destructive and hard to identify, advanced persistent threats (APTs). APTs allow criminals or other groups to gain entry in a number of ways. This could be via infected e-mail attachments, on a USB stick or through the insertion of a malicious device. Any one of these makes information and assets vulnerable to corruption or theft. We provide protection by analysing a company's vulnerabilities: We monitor networks continuously, collect and analyse information. We then protect assets by devising intelligent and active defences. This can be through protective monitoring and the basic antivirus tools, firewalls and encryption active on their network. We use some of the most sophisticated analytics that examine patterns of behaviour . In doing so we are able to distinguish the subtle, covert patterns that characterise an APT attack. This service helps customers stay ahead of the myriad and ever growing number of APTs.

Keywords: Advanced Persistent Threat, data recovery, data security, internet security, IT consultancy, IT Security, network security,

Other products and services from BBS IT Associates

05/05/2015

Accreditation Support

Accreditation support for companies needing to achieve certification with regulatory bodies.


05/05/2015

Accreditation Support

Any company or organisation that is responsible for holding or processing government information must comply with the relevant security standards


05/05/2015

Information and System Security Audits

There is a growing expectation for any company or organisation holding sensitive data to undergo security audits. These are essential


05/05/2015

Risk Assessment and Management

Complete risk assessment and risk management services to protect companies from Information Security risks.


05/05/2015

Information Assurance

Information Assurance, network security and cyber strategy specialists.