/

Vulnerability Assessment & Security Testing

By | Security

pen-test

Do you wonder how well your network protected? Do you have clients and/or vendors asking for your network security policy? Are you required to meet certain security standards?

 

Design One has partnered with Metasploit, the makers of the world’s leading security testing software. This gives us the ability to preform state of the art Vulnerability Assessment & Penetration Testing. For a fixed fee Design One can assist you in developing a written network security policy and put it to the test. This will identify and fix weak links in your information security system. The best offense is a good defense when it comes to your network’s information security.

Regular IT security tests that every organization should perform.

 1.   Vulnerability Assessment to identify and quantify where your network is at risk. This test enables you to locate weaknesses in your defense and provides you with a list of vulnerabilities sorted by risk and host.
2.   Basic Penetration Testing, or “Pen Testing” subjects your network to real-world cyber-attack scenarios. This test:
  • Simulates actions of cyber attackers determined to breach your network perimeter;
  • Exploits critical systems to locates and verifies gaps in your IT security defenses;
  • Provides mitigation procedures.

When should these tests be performed? Security tests should be scheduled and performed on a regular basis. The number of times a test is performed per year will depending on factors such as company environment and industry. In addition to scheduled tests, additional testing should be performed when: • New network infrastructure or applications are added. • Significant upgrades or modifications are applied to infrastructure or applications. • New office locations are established. • Security patches are applied. • End user policies are modified. • Well known vulnerability is revealed to the public. Contact Matthew to schedule an evaluation today.

How to protect your computer from Malware

By | Malware, Virus

Malware is a category of malicious code that includes viruses, spyware, worms, and Trojan horses. Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from file sharing programs. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy.

Malware typically strike people when they are surfing the web. There is not a single type of website where these applications are found, but they are more common from sites offering pirated goods and adult content, as well as blogs and forums. They can even sneak into advertisements on legitimate sites, usually through banner ads at the top of Web page. In order to get installed onto a system, a person is usually either tricked into downloading the program (thinking it’s something else) or a small program called a “Downloader” is installed by the attacker through an un-patched flaw in the person’s web browser. This is often known as a “drive-by” install.

Here are some tips to help protect yourself from malware:

  • Never open email attachments from people you don’t’ know.  Unless you know exactly what the attachment is, don’t open email attachments from people you DO know.  The sender may not know the attachment is infected.
  • Don’t click on any links inside email unless you know for sure they are safe.  If you do, you may install software on your computer.
  • Don’t click on links in spam that claim to offer anti-spyware software.  Some software offered in spam actually installs spyware.
  • Know the standard look of your system alerts.  Stay away from the “No Thanks” buttons if you can help it, and instead close the window with the default “X” at the corner of the toolbar.  For an even more reliable option, use the keystroke combination ALT+F4 for “Close window” built into Windows.
  • Don’t install any software without knowing exactly what it is.  Take the time to read the end-user license agreement (EULA) before downloading any software.  If the EULA is hard to find or difficult to understand, think twice about installing the software.
  • Never respond to financial or other offers, no matter how legitimate they appear to be: legitimate companies do not request confidential information such as credit card or Social Security numbers by e-mail; any sweepstakes or other offer that looks too good to be true should be ignored
  • Limit use of personal email or IM: Your business email is filtered, your personal email may not be.

In summary, follow these simple steps and use common sense. If you think you are already infected call Design One.

Paperless Office

By | Digital Documents

Each year, businesses spend thousands on document printing, filing, and storage, much of which can be eliminated by converting all forms of documentation to digital form, thus reducing or eliminating the need for paper. By converting your paper files to secure digital documents, you can:

Read More

Cloud Computing with VMware

By | Cloud Computing

What is VMware?

VMware is the global leader in virtualization and cloud infrastructure. VMware offers an evolutionary approach to cloud computing that enables enterprises to preserve their existing investments. VMware solutions deliver the benefits of cloud computing with the flexibility, security and control your enterprise needs to meet its unique business objectives. In addition, VMware is a Design One partner.

Read More
START A CLIENT SUPPORT SESSION