Business Computer Security Onsite Review

Mobile Tech Business Services 
Computer Security Review


Is your business secure against cyber attacks?  Are you monitoring your network for rogue devices?

Are you using a secure stateful firewall to monitor your network traffic streams from end to end?  

Is your data encrypted?  Are your hard drives and mobile devices encrypted?  Do you have a mobile device management policy?

Mobile Tech uses a layered approach to computer security. We install and monitor end point solutions to protect your business and your data.  A documented and tested backup recovery plan is critical to recover from cyber attacks. 

Serving Tampa Bay and Pinellas County Florida.

Tampa Bay and Pinellas County business owners have been a constant target of cyber criminals since 2017.  

" In brief: It's starting to look as if Florida cities have become the favorite target for ransomware attacks" ~ The TechSpot, July 1, 2019 ~

"71% of Ransomware Attacks Targeted Small Businesses in 2018" ~ Health IT Security, March 27, 2019 ~
71% of Ransomware Attacks Targeted Small Businesses in 2018

"About 70 percent of ransomware attacks in 2018 targeted small businesses, with an average ransom demand of $116,000, according to a recent report from Beazley Breach Response Services.

Beazley researchers analyzed 3,300 ransomware attacks against their clients last year and found the highest ransom demand was $8.5 million. The highest demand paid by one of their clients was $935,000."

As a whole, ransomware attacks have increased 11 percent from the past year, with 206.4 million attacks, according to recent SonicWall research. The increase is due to hackers mixing and matching malware components to create new variants, which makes it more difficult for tech to detect and identify these threats.

These attacks have increased 133 percent during the last year. These cyberattacks begin with credential theft by phishing or malware campaigns"

Network Hardware Review

• Firewall
- Stateful vs. stateless
• VPN concentrator
- Remote access vs. site-to-site
• NIPS/NIDS
- Signature-based
- Heuristic/behavioral
• Router
- ACLs
- Antispoofing
• Switch
- Port security
- Loop prevention
- Flood guard
• Access point
- SSID
- MAC filtering
- Signal strength
- Band selection/width
- Antenna types and placement
• DLP
- USB blocking
- Cloud-based
- Email
• NAC
- Dissolvable vs. permanent
- Host health checks
- Agent vs. agentless
• Mail gateway
- Spam filter
- DLP
- Encryption

Penetration Test & Vulnerability Scan

• Protocol analyzer
• Network scanners
- Rogue system detection
- Network mapping
• Wireless scanners/cracker
• Password cracker
• Vulnerability scanner
• Configuration compliance scanner
• Exploitation frameworks

Computer Security Tools

• Data sanitization tools
• Steganography tools
• Honeypot
• Backup utilities
• Banner grabbing
• Passive vs. active
• Command line tools

Are your computer systems secure?

Our computer security review troubleshoots common security issues.

Unencrypted credentials/clear text
• Logs and events anomalies
• Permission issues
• Access violations
• Certificate issues
• Data exfiltration
• Misconfigured devices
- Firewall
- Content filter
- Access points
• Weak security configurations
• Personnel issues
- Policy violation
- Insider threat
- Social engineering
- Social media
- Personal email
• Unauthorized software
• Baseline deviation
• License compliance violation
(availability/integrity)
• Asset management
• Authentication issues
Book Service
Share by: