Prevent precious data from being lost

Your ICT environment really safe with our "Network Security".

How secure is your network?

It is important to protect your networks and systems against external attacks and viruses. Often there is sensitive business information on computers or laptops and it is not desirable for hackers to run away with this information. Good security is therefore very important.

Hackers can access your corporate network in various ways. Professional firewalls and antivirus software can help you avoid a disaster. ICT2MKB is happy to advise and assist you in securing corporate networks and systems. With our "Network security" we take security to an even higher level. Do you want to be sure that your information is properly secured? ICT2MKB helps with professional security of both networks and systems.

Security policy

ICT2MKB helps you to determine an optimal security policy that fits your organization and can install, configure and manage the necessary technical tools for you.


Monitoring access

Monitoring is aimed at monitoring the correct functioning of your applications. It not only provides insight into the operation of the technical components (servers, network components, OS, middleware, database) in your landscape, but also provides insight into who has access to certain data.

Deviations in patterns are signaled by monitoring so that measures can be taken in time to prevent incidents.

The greatest danger is often at 70 centimeters from the screen

"People share their credentials, leave passwords or have a password that is too logical."

These apparent "minor" carelessnesses cause the biggest problems. “When implementing new solutions at customers, we consciously advise to also ensure internal awareness in this area. Make employees aware of the risks for themselves and the organization.


Endpoint Security

Endpoint security goes far beyond antivirus. Centrally managed encryption solutions, central management of updates and patches, two-factor authentication and centrally managed policies for real-time file scanning are some examples.

Because endpoint devices are increasingly used outside the perimeter of an organization, the endpoint is an easy attack target. By obtaining access to an endpoint as an attacker, it is often easy to gain further access to an organization's network

The endpoint is also the direct connection with the user, who in many cases can be seduced (with various methods and techniques), allowing unconscious and unwanted access to the endpoint.

Mobile working

In addition to the many advantages, mobile working has a downside. The many devices are often in a strange network. Smartphones in the home network, the laptop of the sales manager in the network of a hotel or logging in with the smartwatch on all kinds of other networks in the future. These networks are often unsafe. A cyber criminal can effortlessly retrieve a password and username via a public WiFi network. As a result, sensitive company data is immediately exposed.


Pentest

A vulnerability test investigates the presence of known vulnerabilities. The penetration test continues and offers the opportunity to formulate specific attack scenarios. In addition to a standard investigation into known vulnerabilities, the creativity, knowledge and skills of Vest security testers are also used to map attack paths. For (web) applications, the business logic can be tested for security risks through the interaction of the security tester, which cannot be recognized by automated tests.

Pentest method

The execution of a penetration test requires thorough preparation. A penetration test is therefore also carried out in phases. In addition to a number of formalities prior to the penetration test, the implementation takes place in the following phases.


Exploration phase

A penetration test starts with an exploration phase. The infrastructure and software used are mapped and available access options are sought.


In the attack

After the reconnaissance phase, the actual attacking begins. By exploiting vulnerabilities, our security specialists can sometimes even take over systems or adjust data. How far the pen test goes, of course, depends entirely on your wishes.


Rapport

After performing the penetration test you will receive a clear and pleasantly readable report. Findings are classified by risk profile. Technical details can be found in the appendix and give the relevant executive employees insight into the measures to be taken and their importance.


Interested?

Feel free to contact us via our contactform or call: +31(0)88 - 428 26 00 for a no-obligation introductory appointment.