WhoshouldIsee Tracks Skip to main content

Cyber Security Day #6 Secure Configuration

By 17th November 2015Italik News

secure-configuration

Are all endpoints, servers and networks securely configured?

By putting in place corporate policies and processes to develop secure baseline builds and manage the configuration and the ongoing functionality of all Information and Communications Technologies (ICT), organisations can greatly improve the security of their ICT systems. Good corporate practice is to develop a strategy to remove or disable unnecessary functionality from ICT systems and keep them patched against known vulnerabilities. Failure to do so is likely to result in increased exposure of the business and its ICT to threats and vulnerabilities and therefore increased risk to the confidentiality, integrity and availability of systems and information.

Using industry standard tools Italik can carry out:

  • Infrastructure audits
  • Infrastructure hardening
  • Penetration tests
  • Maintain patch levels on all systems
  • Control and manage audit logs
  • Monitor network activity

Leave a Reply

Leave Us Your Details

Complete the form below and one of our experts will be in touch shortly.

Service Desk Engineer

Job Description:

  • Provide first point of contact to Italik customers primarily
    onsite but also remotely for infrastructure support. 
  • Work as part of a team to deliver IT Support to our
    customer database under the guidelines of ITIL.
  • Assist on project work where required under the guidance
    of the Project Manager. 
  • Ensure customers are provided with quality support.

Leave Us Your Details

Complete the form below and one of our experts will be in touch shortly.