Internet Security Methods Offered

Listed in order of importance.

Have multiple data backups

Make sure all data, even cloud systems, are backed up to another location. We offer Immutable Data Backup & Instant Recovery 

Second Factor Authentication

Your online banking and other applications must send a “second factor” authentication request to your cell phone. If requiring 2nd factor on a shared office application, we can send a code to all of your VoIP desk phones or to our Infotel textenable cell phone app installed on all employee cell phones. Each installed app connects to the same shared texting account.

PC Anti-Virus

We use either Trend Micro or Windows Defender anti-virus. On your Windows PC, follow the pictured 3 step process to verify your anti-virus is “all green” or click on it to display the broken item and choose “Turn On” to clear the issue.

Email Security Package (#1 source of virus attacks)

One example would be Microsoft (EOP) Online Protection to include DMARC registration of your email domain. Dmarc tells the world what servers can use your domain name to send email. DMARC protects your domain identity such as service123@infotelsystems.com from being stolen.

Computer server security 

  • Operating System Patches are scheduled and attended.
  • Virus protection software from a paid service with virus updates set to daily.
  • Daily server health monitoring from our data center.

Penetration Testing and Domain controller testing

Use a 3rd party penetration testing tools to test a domain and then plug the detected holes. We use securityscorecard.com

A layer 7 firewall stops outbound traffic to bad web sites 

Install an advanced security router using professional install services from the manufacturer. You attend the session or answer a survey to lock things down to essential traffic.

  • May we lock out access to/from Russia, China and Iran IP addresses?
  • Who needs social media access at all or at what times
  • Can we restrict surfing to 100 web sites? Will you accept an open Internet research computer on it’s own network?
  • May we shut down Internet access and or wifi at certain times?
  • Restrict access to a current MAC list. A visitor’s laptop would not work with a hard wired connection.
  • Only DNS, HTTP(S), DHCP and ICMP services for LAN and WiFi interface.

Active Directory (AD) server controls your staff’s behavior 

A computer virus is a malicious software program that runs on your PC. Prevent virus installs and you prevent viruses.  An AD server is a guard that tells work stations what it can and can not access or install, enforces complex passwords and password changes, restricts users to only the required network directories for them to do their job.

VPN connections for voice and data traffic

We use 256bit encryption VPN tunnels to connect to our customers. We started using encrypted voice back in 2004 before anyone else.  Now, it’s a VoIP requirement for many industries.

Isolated voice and data networks

  • Physical separate voice and data cabling and Ethernet switches are provided.
  • Logically separated VLANs from the edge router are programmed.

Mobile Devices

We believe Apple IOS is more secure than Android. We can extend group security policies to these devices.

Train users to resist “spear phishing” attacks. Clicking on a “bad” email hyperlink is the #1 cybercrime point of entry.

  1. Require your users to study the NIST web site. This site explains phishing and methods to defend against phishing attacks.
  2. Have a meeting and ask your employees to quiz each other on phishing risks. Make it a game.
  3. Allowing us to impliment a benevolent phising service. When we catch a user falling for our email, we will alert you to train again.

Rehearse a prepared disaster recovery plan

… to recover clean offline data to fresh formatted workstations and servers on a backup network. For this, we offer

Cyber Insurance

The cyber insurance industry is young and coverage has many gaps. Yet, it’s sometimes required by your business partners. Money spent on prevention via the above methods to include 3rd party audits increases your chance of being paid for a cyber claim.

Things we do at our own cost