Graphic of computer coding with the words data breach and cyber attack highlighted

Leading Through Tech Security Report

[vc_row][vc_column][vc_column_text css=”.vc_custom_1616756912485{margin-bottom: 0px !important;}”]

An ounce of prevention is worth a pound of cure.
― Benjamin Franklin

You may not have heard of Ed Skoudis. Ed is one of the world’s leading Cybersecurity experts. He specialises in teaching security professionals the latest techniques to counter hackers and is often the first person brought in by Governments when there is a security breach. The reason for mentioning him is to relay a true story, though it reads like fiction, it is far from it.

Vulnerability Testing

One of his security teams was carrying out a series of vulnerability tests on an acute hospital in America (it shall remain nameless to save blushes). During their controlled security test, Ed’s team uncovered a vulnerability in one computer which allowed it to be controlled from outside the hospital’s network. That computer controlled a laser-scalpel which was used in the cardiac surgery unit of the hospital. The team were able to access the device and activate it at will, as well as control it at any time. 

Needless to say, this is an extreme example of a security flaw within an organisation and however well protected you think you are, you are not that well protected. 

Why the increase in cybersecurity incidents?

The reason for this is twofold. There are a pair of forces at opposing ends that contribute to the increase in cybersecurity incidents. In one corner, we have the attackers, those Bad Actors who are interested in exploiting any flaws in a system. Then we have the organisation, who are often at times struggling with the increased overhead of urgent security tasks and risks. 

With the ongoing shift towards mobile workstyles and digital transformation, security risks are never more prevalent. Microsoft research revealed that 70% of large Irish companies have experienced problems with phishing, hacking, cyber-fraud, or other cyber-attacks. In the MSP space, the figures are similar and not dependent on any vertical. Every organisation it would seem is up for grabs.

How Intuity improve your Security

To help our customers with emerging threats, Intuity has developed a custom offering. Our Customer Environment Assessment (CEA) is a service wherein a security subject matter expert carries out a full infrastructure review which will offer guidance and protection against the growing vicarious nature of remote, well-planned, and well-executed cyber-attacks on your critical platforms.

By carrying out a CEA, you will benefit from a full, independent evaluation of your organisation’s cybersecurity posture. This will identify vulnerabilities, threats and risks across the following elements:

  1. Firewall/Endpoints
  2. Active Directory 
  3. Servers
  4. Office 365 
  5. Virtual Infrastructure
  6. Wireless Network Infrastructure 
  7. Perimeter
  8. DR / Backups

The findings of the assessment will include a “top ten risks” document in the form of a risk register along with agreed mitigation steps and dates will be finalised between all stakeholders.

Please contact us today to arrange a suitable date to carry out your CEA. You don’t want to ever have to call Ed Skoudis.



Cybersecurity Glossary | Assured Enterprises – Serious Cybersecurity™Ed Skoudis | SANS Institute[/vc_column_text][/vc_column][/vc_row]