Advanced Phishing & Spam Protection
Web Protection (DNS)
Security Awareness Training
Microsoft 365/Google Workspace Back-up & Recovery
Microsoft 365/Google Workspace Multi-Factor Authentication
Network Security
Advanced Phishing & Spam Protection
Did you know that 66% of malware is via email attachments? 1
Our offering is a simple approach to email management and security. We provide a comprehensive email protection and continuity product that helps defend against the latest threats, from spear-phishing, ransomware, impersonation and other targeted attacks.
Impersonation Protection:
Our solution provides real-time protection against social engineering attacks like whaling, CEO fraud, or W-2 fraud.
URL Protection:
A layered security check is performed on the destination site when users click on a link from an email. In addition, following the initial URL link check, the solution then determines if the link downloads to a file directly and scans for potentially malicious content in the file.
Attachment Protection:
Replaces attachments that potentially contain malicious code with a clean, transcribed version. Employees have access to the original file that undergoes a detailed security analysis.
Web Protection (DNS)
Did you know that email and web are collectively used to deploy 99% of malware-based cyberattacks? 2
Adding our Web Protection service provides an additional layer of protection between an employee and the internet by blacklisting dangerous sites & filtering out unwanted content, in the office or at home. The domain name system (DNS) works like a phone book for the internet. When your employee enters a website, the DNS servers take that input and translate it into the unique internet protocol (IP) address that lets the browser open the desired site. DNS protocols are highly vulnerable to cyberattacks. By redirecting users’ web traffic through a cloud-based, DNS security solution, businesses can finely tune and enforce web access policies, ensure regulatory compliance, and stop threats at the network’s edge.
Security Awareness Training
Did you know that 77% of security professionals rank Awareness Training as the most effective tactic to prevent or block ransomware? 3
More than ever, employees are the weak link in an organization’s network security. They are frequently exposed to sophisticated phishing and ransomware attacks. Employees need to be trained and remain on their toes with security top of mind.
Find out how we can help you manage the continuing problem of social engineering and create a human firewall.
Simulated Phishing Campaigns:
StratusPointIT will create a phishing simulation to test your employee’s awareness to potentially harmful emails, from who opened, clicked, and entered credentials. We will notify the employee that the email was a test and show them the key indicators within the email to watch out for, from incorrect/mis-spelled domain names to hovering over links within the email. In addition, we will provide management with a report of the results.
Training Videos and Newsletters:
StratusPointIT will provide access to training videos and newsletters focused on numerous areas for your respective business. From CEO Fraud, Credit Card Security, GDPR, Mobile Device Security, Ransomware, Strong Passwords, PCI compliance, Safe Web Browsing, and much more.
Microsoft 365 / Google Workspace Back-up and Recovery
Did you know that 74% of security professionals rank Data Back-up & Recovery is the most effective solution to respond to a successful attack? 4
Having your Microsoft 365 and/or Google Workspace backed-up provides a multi-layered approach to security against ransomware, compliance needs such as HIPAA, & advanced recovery features. It’s a common misconception among SaaS/Cloud users that doing back-ups isn’t necessary for their data because it exists in the cloud. From human error to phishing emails or malware can cause data loss. SaaS/Cloud providers protect your data from hardware failure, software failure, natural disaster, and power outages. While StratusPointIT can help protect your data from human error and malicious acts from internal or external sources.
Key Features:
- For Microsoft 365 protect your OneDrive, Contacts, Calendar, Mail, and SharePoint Online data that goes beyond Microsoft 365’s native recovery capabilities and retention period.
- For Google Workspace protect your Mail, Contacts, Calendar, and Drives (including Team).
- Automated backups once a day that capture point-in-time snapshots of each users’ relevant app data, with the option to perform additional backups at any time.
- Unlimited storage space.
- Detailed activity log with all administrator and user action records.
- Your data is secure, easily recoverable, and protected. SOC 2 Type II audited, supports HIPAA and GDPR compliance needs, data encryption both at rest and in transit.
Microsoft 365 / Google Workspace Multi-Factor Authentication
Did you know that 81% of breaches leverage stolen and/or weak passwords? 5
Establishing multi-factor authentication (MFA) by sending a second randomly generated pass code to your phone for your Microsoft 365 and/or Google Workspace account will further protect your company from malicious attackers.
Better Protection. Better Security. A Better Business.
Network Security – Scans, Firewalls, and Monitoring
When was the last time you scanned your network for vulnerabilities?
At StratusPointIT we can scan, analyze, and remediate network vulnerabilities, and improve your security. A key element of protecting your Network is ensuring you have leading business-class firewalls installed with proper security controls. We can purchase, install, and manage the firewall environment for you.
Key Features:
- Active-device monitoring and alerting
- Remote configuration and troubleshooting
- Network scans for vulnerabilities
- Firewall solutions
- Managed Detection and Response – network & log-based intrusion detection supported by a Security Operations Center (SOC).
Footnotes:
(1) and (5) Verizon 2017 Data Breach Investigations Report 10th edition
(2) Cisco Annual Cybersecurity Report for 2018
(3) and (4) Cybersecurity Insiders & Bitdefender 2017 Ransomware Report