Often security is left as an afterthought and attackers take advantage of the newly created vulnerabilities in the system and the social panic. Ensure your organisation is secure and your data protected through a Remote Access Penetration Test.
Securing Remote Workers
If you are in the process of rolling out remote working for your organisation, this article will cover the basics you need to protect your organisation from cyber threats.
Remote Access Break-In
The main objective of this type of penetration test is to obtain internal access to your organisation’s network.
It will test the outer layers of defences a company has put in place to protect remote working such as your remote access system, Citrix, Office 365, etc.
The main objective of this type of penetration test is to assess what a hacker can achieve if they bypass the remote access systems security controls and successfully gain internal access to your organisation’s network.
It exploits the possible misconfigurations of a rushed remote working roll out and checks what the VPN connection could be a path to.
External Vulnerability Assessment
The objective of this scan is to asses and highlight vulnerabilities in your public facing infrastructure which may provide a route into your network. Vulnerabilities are scored by priority and remediation advice is provided
FREE personal PC and Mac protection for all Chess Sophos customers
For the duration of the COVID-19 global health concern, all Chess customers who are purchasing Sophos solutions can protect their employees’ personal PCs and Macs for free with the Sophos Home Commercial Edition program.
Contact your Account Manager for more information.
Most Recent Blogs
Staying Secure Online
Our Information Security Officer, Joseph Ball regularly writes articles on different aspects of security. Joe's articles have proven to be really popular with our own people and he's often asked if they can be shared with colleagues outside of Chess. With this in mind, I thought it may be something you are interested in.
Capturing Requirements in a Virtual Workshop
Until March this year, the assumption was that we could meet in person with a client or project partner several times to move through the requirements definition process. As it turns out, the process of developing a new digital approach which utilises a combination of existing and emerging tools has evolved like a project in itself. These are our tips.
Critical Thinking and Confirmation Bias
I'm not a supporter of #DeleteFacebook because it's like saying if you don't want to get electrocuted, get rid of electricity. It's stupid. No, demand better standards for your electricity, so you don't get electrocuted…" – Christopher Wylie, Cambridge Analytica whistle-blower
Chess Wins Two Cybersecurity Awards
The Chess team have proven the invaluable work they do and have been recognised for their outstanding performance and commitment to securing organisations, by picking up two awards in the Sophos Partner Awards 2020 - Public Sector Partner of the year and Education Partner of the year.