Cyber Security Brochure 2023

Page 5

CYBER SECURITY

How IntaForensics Protects Your Data In The Ever-Changing Cyber Security World.

ABOUT INTAFORENSICS

Established in 2006, IntaForensics has grown to become one of the leading providers of cyber security and digital forensics services in the UK. Our team has been built carefully and consistently through recruitment of the most technically competent and experienced cyber security and industry specialists from law enforcement, government agencies and the commercial world.

IntaForensics holds certification to ISO 9001:2015, ISO 14001:2015 and ISO/IEC 27001:2013 and maintains an ISO/IEC 17025:2017 scope of accreditation as defined on the UKAS website; accredited organisation 7733. IntaForensics has also achieved accreditation against the Forensic Science Regulator’s Codes of Practice and Conduct for the activities detailed in this UKAS schedule.

The accreditations have continued into 2023, with IntaForensics becoming the UK’s first organisation to be granted ISO/IEC 17025 accreditation and the Forensic Science Regulator’s Codes of Practice and Conduct for cell site analysis.

Our Cyber Security Services

IntaForensics are accredited by IASME (Information Assurance for Small and Medium Enterprises) as a Certifying Body (CB) for the Cyber Essentials (CE), Cyber Essentials Plus and IASME Cyber Assured Schemes. Most recently, IntaForensics has become an Assured Provider for the National Cyber Security Centre (NCSC) Cyber Advisor Scheme.

IntaForensics maintains an incident response capability for clients and can deploy a response team at short notice. For an urgent/critical out-of-hours requirement, staff can be mobilised throughout the UK within 2 hours.

The company has 24 hour on-call response and regularly delivers onsite engagements, performing triage, providing specialist advice and consultative services. Our UK facility is state-of-the-art and designed to provide an unparalleled cyber security consultancy, incident response and forensic investigation service.

Cyber Essentials

Cyber Essentials Plus

Managed Security Service Provider (SOC / SIEM)

Incident Response

Penetration Testing

Independent Investigations

CYBER ESSENTIALS

What is the Cyber Essentials Scheme?

Cyber Essentials is a Government-backed, industry supported foundation for basic cyber security hygiene. The scheme has been carefully designed to provide guidance to organisations of any size in protecting themselves against cyber threats. Cyber Essentials helps organisations to address the basics and to prevent the most common cyber-attacks.

Why do I need Cyber Essentials?

Almost 40% of UK businesses experienced a cyber-attack in 2022, so far 26% of charities had a cyber security attack in the winter of 2021/22

The average cost of a cyber-attack is £4,200 rising to £19,400 for medium and large businesses

Even after the world has opened up in the wake of the COVID-19 pandemic, many businesses are still operating a hybrid working culture. This has made cyber security more challenging for many organisations with direct security and user monitoring becoming more dfficult where staff are working remotely. Upgrading hardware, software and systems has also become more complex where the pandemic has stretched resources and led to competing priorities in IT and cyber security teams.

Cyber Essentials

Cyber Essentials is an independently verified self-assessment. You complete an online assessment questionnaire which is approved by a Senior Executive.

Upon submission, IntaForensics will independently review and verify your responses and if successful, we will award you the requisite certificate and badges that you can display on your company website.

Cyber Essentials Plus

This is the next stage of your security journey and involves both independent internal and external tests of your network and internetfacing devices.

Successful

accreditation

against Cyber Essentials Plus provides a higher level of assurance that your organisation has a strong cyber security regime with correctly implemented controls. Thereby maintaining a robust defence against Internet-based attacks.

Cyber Essentials Process

Stage 1

The applicant company identifies the systems it believes are at risk from common Internet-based threats. This forms the scope of the Cyber Essentials certification.

Stage 2

Using the available reference documentation and readiness tools, the applicant company can confirm that their scope is accurate and they are meeting the required controls.

Stage 3

Apply for Cyber Essentials self-assessment, and complete the online assessment questionnaire. The assessment is reviewed by a qualified assessor, feedback given if necessary, and certification is issued if all responses are compliant.

Stage 4

Cyber Essentials certification becomes an integral part of the business, and forms a strong foundation on which to mature Cyber Security within the organisation.

MANAGED SECURITY SERVICE PROVIDER

With competing demands on budget and resources, more and more organisations are opting to outsource key security monitoring services to a Managed Security Service Provider (MSSP). Whether for log management, managed detection and response (MDR), SIEM-as-a-Service, or compliance management, organisations large and small are turning to MSSPs such as IntaForensics, to deliver these solutions quickly and cost-effectively.

Now is the time to adjust your security strategy — before your perimeter defences are no longer effective against cyber-attacks. Beyond prevention, you need swift breach detection and remediation to minimise the time criminals spend in your environment and the harm they can cause.

As a leading Managed Security Services Provider (MSSP), IntaForensics in partnership with AlienVault, not only offers monitoring and detection services from its advanced SOC but around-the-clock rapid response and remediation services. Backed by the leading ISO/IEC 17025 accredited provider of digital forensic services to Law Enforcement and Government Agencies.

IntaForensics Cyber specialists will help you tailor your AlienVault USM Anywhere™ implementation to support your key business initiatives.

AlienVault® is a network security system that gives you everything you need to quickly identify cyber threats and manage compliance. This intelligent security platform can be tailored to meet the IT requirements for any business. From small businesses to large enterprises, who require the ability to quickly respond to a cyber threat in order reduce downtime and get their systems and processes restored in a timely manner.

The AlienVault® Unified Security Management™ (USM) platform provides five essential security capabilities in a single console combined with integrated threat intelligence. This gives you everything you need to quickly identify threats and manage compliance.

Breach Detection

Actively searching for threats is important for keeping your business safe. To find threats, you need a team that monitors and manages your environment 24/7, 365 days a year, using advanced technology and analytics.

Minimising Data Breach Window

The most precious resource for a threat is time. Your security strategy must include an approach to closing the breach window as quickly as possible — to minimise exposure, reputational damage and cost.

Threat Remediation

Traditional managed security service providers simply notify you of a breach, leaving it up to you to respond. But we act on security events immediately, on your behalf, based on pre-approved actions and supported by our ISO/IEC 17025 digital forensic laboratory.

Reducing Total Cost of Ownership

Maintaining a fully staffed, around-theclock security team can be expensive. By turning to a MSSP, with the resources and experience to detect and respond to security events on your behalf, you can help ensure your environment’s security while reducing your total cost of ownership.

INCIDENT RESPONSE

Why do you need an Incident Response Service?

The industry adage is that there are two types of businesses: those that have been hacked and those that don’t realise they have been hacked. This may sound a bit of a cliché but if you are the victim of a cyber-attack, what will you do? Do you have a documented, valid and proven incident response plan? You cannot afford to bury your head in the sand and hope that it will go away.

A rapid, decisive and professional response could be the saviour of your business with the following benefits:

Minimise/prevent data loss

Reduce reputational/brand damage

Limit financial penalties from Regulators

Lessen operational downtime, loss of productivity

Potential reduction in insurance premiums

Known and agreed costs to assist in your budget planning

Why choose us for your Incident Response?

IntaForensics maintains an incident response team of skilled staff in order to respond to client requirements on a 24/7 basis.

The incident response team are experienced in analysing a wide range of incidents, covering a diverse range of business impact scenarios and technical architecture. For example, we have assisted clients that have experienced unauthorised access to systems via remote access technologies, performed investigations for multi-national organisations affected by ransomware and analysed attempts to exploit vulnerabilities within client infrastructure.

It is estimated that Cybercrime will cost the world £8.7 trillion annually by 2025.

Around four in ten businesses have reported suffering from cyber security breaches or cyber-attacks in 2022.

2-Hour Response Window

IntaForensics provides guaranteed response times for retained customers, ensuring that the support you need is available when you need it. This means you can speak to a member of the team and start remediating your incident with minimal time lost.

Incident First Responder Training

Preparing for an incident before one happens, gives your business the best possible chance to minimise the impact of any security breach. Our Incident First Responder training ensures your team have the necessary knowledge to respond to incidents when they occur and can confidently undertake the relevant stages of the response process.

Bespoke Incident Response Plan

Just over a quarter of charities (26%) have reported suffering from cyber security breaches or cyber-attacks in the winter of 2021/22.

No two businesses are the same, and so no two incident response plans should be either. Our experts will create a bespoke incident response plan that is designed around your business and your environment.

Medium Businesses 65%

Large Business 64% High-Income Charities 51%

Much like in previous years, the number of cyber-attacks is higher among medium businesses, large businesses and high-income charities.

*Statistics from Cybersecurity Ventures and HM Govt. Cyber Security Breaches Survey 2022.

Next-Day Onsite Attendance

Where an incident requires an onsite presence, our team will deploy to your offices within an agreed time period, ensuring you get the support you need to get your business back up and running.

PENETRATION TESTING

Penetration testing, also known as pen testing and ethical hacking, is a cyber-attack which is employed by our technical specialists to evaluate, probe and test a computer system, network or web application to identify any security vulnerabilities that could be exploited by cyber criminals.

The cyber-attack process can be performed manually, or through the use of software applications and is designed to simulate an attack upon a system. It should be viewed as a method for gaining assurance in your organisation’s vulnerability assessment and management processes, not as a primary method for identifying vulnerabilities.

IntaForensics offers penetration testing engagements to suit our client’s needs, enabling them to reinforce their cyber security policies and procedures to better protect them from future threats. Our penetration testers are trained in Network, Web and Infrastructure testing disciplines and can offer versatile engagement solutions to any testing environment.

Types of Penetration Testing

Black Box Penetration Testing

Without Login Credentials

Black Box tests are where the penetration tester knows nothing of the infrastructure to be tested. It is more indicative of a real-world, attack, but this method may not always expose all vulnerabilities.

Grey Box Penetration Testing

With User Credentials

Grey Box tests are the most popular form of test that takes a balanced approach between Black and White Box tests.

A Grey Box test discloses just enough information to perform a thorough, methodical test, whilst keeping the scenario relevant and realistic.

White Box Penetration Testing

With Full Admin Credentials

White Box tests are where the penetration tester has access to full, indepth information on the infrastructure to be tested. Whilst not as realistic as a Black Box test, it allows for a very thorough test.

Our Penetration Testing Methodology

Scoping Testing / Scanning

Our penetration testing team will work with you to understand your environment and map out your areas of risk. This will form the basis to define the scope and goals of the penetration test, including the systems and testing methods to be used.

We perform the testing methods to understand how the target environment responds to intrusion attempts. All testing is performed in line with the documented scope, and will only use testing methods that have been agreed.

Gaining & Maintaining Access

By exploiting any identified vulnerabilities, the testing will determine if they can be used to achieve a persistent presence in the system— long enough for a bad actor to gain in-depth access. This is to simulate real-world advanced persistent threats, which often remain in a system for months in order to steal sensitive data.

Analysis & Reporting

A comprehensive report is produced for the client, detailing the specifics of any vulnerabilities exploited, the type and location of data exposed and any other pertinent items. Recommendations for resolving any identified issues will be provided.

What Are The Next Steps In Strengthening Your Cyber Security?

CONTACT OUR CYBER SECURITY TEAM.

Our team of cyber security experts have many years of experience in identifying and protecting against current and impending cyber security risks.

Organisations are constantly under threat from cyber-attacks and our team of consultants advise and support clients to ensure they understand the dangers and implications of a successful attack.

Our Cyber Security Business Development Team are on hand to help you in identifying the products and services which are most suitable to your organisation.

sales@intaforensics.com The Courtyard, Eliot Business Park, Nuneaton, CV10 7RJ 02477 717 780

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.