Cyber Security

Keyfort’s Vulnerability Scan 

It is important for your organisation to review and audit cyber security on a regular basis. To save time and money, Keyfort can run a vulnerability scan to identify any weaknesses your organisation may have, and create a follow-up action plan on how you can protect yourself.

Cyber security is the protection of your data, systems and networks from ransomware, theft or damage to hardware, software or even your electronic data.    

Cyber Security staff training video for the Not for Profit and Education sectors: 

Contact Keyfort for More Cyber Security Information! 

Firewall Management

Having a  firewall is like having a security desk for your computer’s IT network. Just as you control access to and from the buildings, a firewall controls access to and from your computer networks, protecting you and your users from cyber crime.

Benefits of having a Firewall:

  • Monitor traffic: a firewall will identify and stop malicious or suspicious traffic from reaching your organisation’s network.
  • Remote access: with a properly configured firewall, staff can work securely from the office, at home or even remotely.
  • Block access to certain sites: a configured firewall can have a set of rules that can help to prevent staff from wasting valuable time going on networking sites or unsolicited internet sites.
  • Set user access rights: it is imperative to set an appropriate level of access to each user, as it not only safeguards the rest of the staff but also prevents key secure data from being leaked.

How Firewall Management can benefit your organisation

  • Protects the integrity of staff: cyber attacks can cost organisations both time and money and can also cause serious damage to relationships internally and externally to the organisation.
  • Reduce costs: with a managed firewall service, there are some significant up-front savings
  • Increase productivity: with a properly configured firewall, staff will be able to work securely from the office, at home and even on the go.
Access Rights

Managing user access rights is essential to ensure that data files are only available to the appropriate staff. For data pertaining to accounts, personnel, operations, sales, etc should not be available to all and the integrity of the data must be protected as required by General Data Protection Regulations (GDPR).

User access rights can be set using your Active Directory or similar user management systems. For audit purposes each user should not share user accounts. For security, admin accounts should be restricted and not used as user accounts.

For all staff role changes, leavers and starters the user accounts should be updated accordingly. This is an ongoing and not a one-off task. User access rights should be reviewed every 6 months.

Daily Off-Site Backups

Offsite backups are a means of securing data to a server or media in a different location than the primary server.

The Benefits of Daily Off-Site Back-Ups

  • Reliability: the backups are automated and every necessary file is backed up on a daily basis. This allows companies to recover the most recent data more quickly without losing significant data.
  • Easy set-up: if you have an IT professional set up the system and the schedule or automation and you can rest easily knowing that your data is protected, backed up, and up-to-date.
  • Reduced workload: since remote data backup involves automation, you won’t need to worry about taking the time to back it up.

What can Keyfort do for your organisation?

  • Set up: Keyfort’s engineers will set up and arrange an automatic daily off-site back up around your office hours so there is no disruption. The backup is transferred to secure UK-only data centres.
  • Maintain: Keyfort will perform weekly checks to make sure that your organisation’s key data is continuing the synchronized automatic backup.
  • Restore: if an event of onsite corruption or harmful errors occurred, Keyfort can restore your original data.
Multi-layered Anti-Virus

Next Generation Anti-Virus is designed to protect your organisation from advanced attackers and potential threats. It is a more advanced version of the traditional anti-virus.

It is easy to upgrade from your old anti-virus to Next Generation Anti-Virus. Plus there is promotional pricing to provide free cover for the remaining period of your old anti-virus cover*. There is not better time to improve your cyber security.

*Promotional pricing is available to replace old anti-virus licenses subject to a minimum 1-year Next Generation PC Anti-Virus purchase.

Contact Keyfort today to upgrade your anti-virus to the Next Generation Anti-Virus. We will take care of the rest!

Software Patch Management 

For organisations with multiple servers and computers, ensuring that all of them are updated can be both time-consuming and challenging. With software patch management regular updates will be implemented, and your software will be scanned for vulnerabilities. If any vulnerabilities are identified, software patch management will fix them on your software and applications, which will help your organisation reduce its security risk.

Contact Keyfort today to install Software Patch Management when you upgrade your anti-virus to the Next Generation Anti-Virus. We will take care of the rest!

Cyber Essentials

Cyber Essentials is a simple and effective Government backed scheme that will help you protect your organisation against a range of common cyber-attacks such as ransomware, phishing attacks and malware.

Cyber essentials also provides a statement of the basic controls which organisations should use in order to protect themselves from threats.

It is backed up by industries such as FSB (formally Federation of Small Businesses), the CBI (Confederation of British Industry) and a number of insurance companies.

UK Government has required all suppliers bidding for sensitive/personal information and handling contracts to be certified against the scheme since October 2014.

ISO27001 Information Security Management

Using ISO 27001 standards enables organisations of any kind to manage the security of assets such as financial information, intellectual property, employee details or information entrusted by third parties. The ISO 27001 standard is widely known for providing the requirement for an information security management system (ISMS).

What is an ISMS?

An ISMS is a systematic approach to managing sensitive company information so that it remains secure. It includes people, processes and IT systems by applying a risk management process. It can help small medium, and large businesses in any sector to keep information assets secure.