Cybersecurity

From Supporting Role Wiki
Revision as of 12:17, 14 May 2018 by Mvanbeek (talk | contribs)
Jump to navigationJump to search

CyberSecurity with a Forget About IT® Server

Forget About IT Ltd use a number of tools to minimise the risks of a breach to your Forget About IT® server. Based on the 5 technical controls of the UK government's Cyber Essentials, this is what we do:

Firewalls

There are three main types of firewall:

  1. Boundary Protection
    We make sure that the main incoming connection has a firewall and that it is correctly configured, that the default passwords are changed, and that the only incoming traffic is the traffic we want to get through.
  2. Server firewall
    The server we supply is also fire-walled, and the settings are managed so that even if someone managed to turn the firewall off, or change settings, it will revert back to the original settings within the hour.
  3. Workstation firewall
    If we are also looking after your desktop computers, we will also make sure that it's firewall is turned on as well, and is correctly configured.

Passwords

  1. Default Configuration
    We change all the default settings of any network device that could be used as a stepping-off point for an external breach.
  2. Separate user names and passwords
    We set up separate accounts for each user, with passwords that they can manage. If required we can impose a minimum password complexity and age.
  3. Monitoring
    The server has monitoring software that checks for brute force password attacks on externally accessible accounts, and after a certain number of password guesses, the attackers location will be blacklisted.

Access to Data and Services

  1. Administrative Accounts
    If we are looking after your desktop computers, users normally have no administrative rights. If we do not look after your desktops, we usually only allow administrative access to a user's own computer. Since Forget About IT Ltd looks after the server, end users have no administrative access to the server.
  2. Group membership
    Access to data is controller by group membership, and only users authorised to access an area are members of the group used to control access.
  3. Access to Software
    If we are looking after your desktop computers, then we will uninstall all redundant software, and also limit what is installed.

Viruses and other Malware

  1. Servers
    The server regularly scans itself for viruses and alerts us to any concerns. Since the server itself is not allowed to open any files from unknown sources, it's exposure is limited. The server also prevents a known program from accessing areas on the server not explicitly authorised.
  2. Desktops
    If we are looking after your desktop computers, we will make sure there is an an anti-virus / anti-malware solution in place.

Updating

  1. Servers
    The servers install security patches automatically, and we will install all others at the next maintenance interval, which is usually the first "out of hours" period after the patch is released.
  2. Desktops
    If we are looking after your desktop computers, we will regularly check that the devices are up to date. Where possible, we will also make sure automatic updating is enabled.