Often security is left as an afterthought and attackers take advantage of the newly created vulnerabilities in the system and the social panic. Ensure your organisation is secure and your data protected through a Remote Access Penetration Test.
Securing Remote Workers
If you are in the process of rolling out remote working for your organisation, this article will cover the basics you need to protect your organisation from cyber threats.
Remote Access Break-In
The main objective of this type of penetration test is to obtain internal access to your organisation’s network.
It will test the outer layers of defences a company has put in place to protect remote working such as your remote access system, Citrix, Office 365, etc.
The main objective of this type of penetration test is to assess what a hacker can achieve if they bypass the remote access systems security controls and successfully gain internal access to your organisation’s network.
It exploits the possible misconfigurations of a rushed remote working roll out and checks what the VPN connection could be a path to.
External Vulnerability Assessment
The objective of this scan is to asses and highlight vulnerabilities in your public facing infrastructure which may provide a route into your network. Vulnerabilities are scored by priority and remediation advice is provided
FREE personal PC and Mac protection for all Chess Sophos customers
For the duration of the COVID-19 global health concern, all Chess customers who are purchasing Sophos solutions can protect their employees’ personal PCs and Macs for free with the Sophos Home Commercial Edition program.
Contact your Account Manager for more information.
Most Recent Blogs
Home Working - Can You Collaborate?
#3 Connectivity and Support at Home
Working from home is now an everyday reality for many of our customers and network issues can be a challenge
As schools have now closed and other businesses have also sent people home, many home workers are struggling with ensuring they can run their real-time work apps such as Voice and Video conferencing without interference from other people, who are also working from home or using other online content
A Hackers Guide to Remote Working
Remote working for a hacker is brilliant, and not in the sense that they can work from home in a dark room wearing a hoodie. But because remote working means that a business is intentionally giving a path into the internal network that could potentially be accessed by anyone on the internet. This blog post covers some of the things that we have encountered across the team over the years.
#2 Your Cyber Security
If you are allowing devices to connect from people’s houses – it's possible that these networks have already been compromised by hackers or will be in the future. Implementing two-factor authentication, where another device like a mobile phone is used for extra security is the most important security measure that can be applied to systems.
#1 Your Telephony
As the Covid-19 situation looks set to escalate, there's a lot to think about to keep your business running. Last week we shared the Top 10 areas we've focused on to ensure our own business continuity.
From today, we'll be going into these in more detail, setting out what we've learnt and offering specific guidance and support. Let's start with telephony.
About six months ago, with the slow death rattles of the exquisite Empire C2 drawing near, not going to lie I'm still in mourning – that and python2, I was on the hunt for a new platform to sink my teeth into. While playing around with various frameworks on offer such as SilentTrinity, Faction, Merlin (all of which have their positives), I started looking at Cobbr's Covenant framework....