loading

Our Approach to Cyber Security

There is not a “silver bullet” when it comes to Cyber Security but a good Defense can help.

C3SD Inc. has combined our knowledge of working on networks for over 35 years, following best practices like those suggested in HIPAA documentation and the American Bar Association and implementing “best practices” like Microsoft’s suggestions to harden Windows 10 versions 1909 & later.

Over time this has allowed us to craft a series of documents that we use to conduct a Cyber Security Audit, including line items such as how often passwords are changed to if the company conducts employee training. The completed Audit is then presented along with suggestions as to how Security may be improved.

We have found this process works well for a wide range of clientele that work in a variety of industries and is based upon the following pillars.

Deep Packet Inspection & Intrusion Detection
Deep Packet Inspection & Intrusion Detection

Completed on a FortiNet Enterprise Class Router, each data packet that enters and exits a network destined for the internet is scanned and checked to ensure that it's safe.

Managed Antivirus
Managed Antivirus

Network wide anti-virus installed on each PC and Server that communicates with a centralized management console. If a single device is infected, it alerts the central server and the network is locked down.

Email Spam & Virus Protection
Email Spam & Virus Protection

Inbound and Outbound email is scanned for spam and potential files that can lead to a Virus infection.

Use of PC & Server Firewalls
Use of PC & Server Firewalls

Enabling a PC's firewall will assist in preventing 'worms' from spreading. Its use also prevents unauthorized access from other PCs.

User Education
User Education

Ensure that employees know and understand the basics, such as not to open emails and attachments from those they don't know.

Website / URL blocking
Website / URL blocking

Block access to websites and URLs based upon categories and risk assessment.

Honeypot Monitoring
Honeypot Monitoring

A device deployed to the network by C3SD Inc. Its sole purpose is to allow malicious code to access it, with the understanding that if something does it needs to be investigated further.

Use of Modern-day Operating Systems
Use of Modern-day Operating Systems

At the Current date Microsoft only supports the Windows 10 Desktop Operating System and Windows 2012, 2012R2, 2016 and 2019 Server Operating Systems. Therefore, only those listed here should be in use.

Login Account

Already a Rubnio Customer?

Invaild email address.

6 or more characters, letters and numbers. Must contain at least one number.

Your information will nerver be shared with any third party.