According to the latest Government Cyber Security Breaches Survey 2022, 39% of UK businesses identified a cyber-attack in the last 12 months. However, this is not the whole story: the findings also suggest that less cyber mature organisations may be underreporting such incidents.
John T Chambers, the former executive chairman and CEO of Cisco, famously summed up this situation when he stated, “There are two types of companies: those that have been hacked, and those who don’t know they have been hacked.”
An anxiety-provoking statement perhaps, but the truth is, that available evidence suggests most businesses are probably not as diligent with their cyber security as they should be.
Whether you’ve recently been hit by a cyber-attack or are looking to take precautions following an audit, there are plenty of cyber security tools for businesses out there that can start making a difference to your cyber resilience today. But which one is right for you?
We have a lot of experience implementing cyber security tools for businesses and seeing the positive results for our clients. In this spirit we have compiled a list of our top cyber security tools for business that our security team swear by.
Some of these tools are our own white label products while others are widely available.
All of them could be useful towards fulfilling the 10 Steps to Cyber Security guidance from the National Cyber Security Centre and securing your organisation from breaches and attacks.
Intersys Email Security Gateway: Email Protection
Intersys Email Security Gateway protects businesses against targeted email attacks, reducing the risk of financial and data loss. It uses powerful detection features driven by machine learning with an intuitive end-user experience.
By securing the email perimeter, attacks are detected and blocked before they reach the network — keeping organizations, employees, and data safe from compromise.
Our favourite features:
- Financial fraud protection: analyses emails containing payment requests, banking information and other financial content for signs of fraud and deception.
- URL protection: all URLs are subjected to scanning against real time threat feeds for known and unknown malicious sites and fake login pages.
- Impersonation detection: inspects sender’s email content, language and tone as well as checking for visual and phonetic matches and/or similarities to the recipient organisation.
- Works with all cloud email providers, on premise email systems and hybrid email platforms.
- Completely cloud based, no hardware or software to maintain.
Intersys can implement and manage this solution for your organisation. Contact us for more information.
Intersys Cyber Protect: Backup and Data Protection
This third-party Office 365 backup solution is a powerful tool to protect against accidental or malicious file deletion, data corruption, ransomware, and insider threats.
Our favourite features:
- Backups are stored independently from Microsoft’s estate and can help ensure that data is still available in the event of widespread downtime.
- Granular restores of files in SharePoint, emails in Exchange Online.
- Safeguarding in the event of admin misconfiguration of retention policies in Office 365, accidental deletion and more.
- Ability to retain data indefinitely or for a longer period of time than Office 365.
Intersys can help implement, monitor and protect your Office 365 backup data.
Intersys Cyber Risk Monitor: Device Monitoring
Reduce your cyber risk by understanding which devices are most vulnerable. This is a lightweight agent that can be installed to devices in your organisation. It monitors the real time status of device encryption and identifies exploitable or out-of-date software and computers.
Our favourite features:
- Scans files and assigns a ‘value at risk’ to each file to help you quantify and understand which devices are easy targets.
- Checks for bad practices around least privilege.
- Checks for disk encryption, OS and AV updates.
Intersys can implement this software, powered by Cyban and proactively monitor devices, and help remediate issues.
Intersys Phishing Email Attack Simulation: User Training
Launch realistic phishing simulation attacks, identify vulnerable users and provide cyber security training to your staff. This software helps identify users who are most at risk of clicking a malicious link or opening a dangerous attachment.
Our favourite features:
- Access to an intuitive training portal to the users who are most vulnerable to email phishing.
- Identify which departments are most at risk.
Intersys can help monitor Office 365 Defender Plan 2 or Intersys ID, our own solution, and actively maintain and run phishing simulations for you. We can also generate reports for management.
Microsoft Defender for Cloud Apps: Cloud Security
This tool monitors activity in your cloud apps and alerts you when anything suspicious occurs.
Our favourite features:
- Connect Microsoft Defender for Cloud Apps to Office 365, Azure, Salesforce, Slack, and bring security logs into one intuitive dashboard.
- The tool automatically ingests security log data and generates alerts upon identification of suspicious activity.
- Get rich visibility on how users are interacting with your IT estate.
- Govern access to apps and resources.
- Automatically respond to security incidents by blocking accounts, notifying IT teams and more.
Intersys can help organisations implement Defender for Cloud Apps, and act as your Security Operations Centre, effectively responding to all alerts that generate under your environment.
Threatlocker: Application Whitelisting and Ringfencing
Threatlocker gives organisations the tools to control the flow and access of data. You can choose what data can be accessed or copied, and the applications, users and computers that can access it.
Our favourite features:
- Only allow specified applications to run as an administrator, ensuring that your organisation is abiding by the principle of least privilege.
- Restrict access to your data to only the applications that need it.
- Block unknown applications from running on your employees’ computers.
- Ensure that only approved, safe and secure applications can run on employee devices.
- Protect against ransomware.
- Strictly control which applications can access the internet.
Intersys can help your organisation configure and implement Threatlocker. Deploying ringfencing and application whitelisting tools can take up a significant amount of in-house time, but Intersys can manage and support this for you on an ongoing basis.
Microsoft Sentinel: Cloud Security
Microsoft Sentinel is a cloud-based security platform that can quickly analyse huge amounts of data across an organisation with the help of built-in AI. This tool analyses security data generated by your servers, appliances and devices. It reports on suspicious activity and can help you react with speed to any threats.
Our favourite feature:
- Allows organisations to pull security event data from all devices into one place.
- Suspicious activity can be tracked across multiple platforms.
- Makes access auditing a breeze.
Setting up and managing Microsoft Sentinel can be time consuming. Intersys can configure, deploy and manage Sentinel for your organisation and act as your Security Operations Centre to ensure all unusual activity is investigated in a timely manner.
Watchguard Firewall: Network Protection
This UTM firewall solution from Watchguard can help you manage the complete flow of traffic entering and leaving your network. It provides protection for both office users (through web filtering, ATP and gateway anti-virus) as well as for those working from home.
Our favourite features:
- Log incoming/outgoing data for later referencing to comply with ISO and security policies outlined by your clients or suppliers.
- Block threats entering the network.
- Identify infected devices and respond accordingly.
- Secure VPN solution to allow for home working.
Intersys can help configure and install Watchguard solutions in your environment to a highly comprehensive standard.
If you’d like to try some of these tools for your own organisation, give us a call and we will help you implement them.