Looking for a good place to start? Our Risk Scanner ™ external vulnerability detector looks for holes in your network, where malicious outsiders can break in and attack your network. This provides a view of your organization’s defenses from the outside, and prioritizes any risks in order of severity (impact, solution, exploitability, associated malware, and more) for a keen understanding of your security posture.
Direct Technology uses a six-point layered defense plan to design a resilient environment. We start with the Human Layer and delve deeper into the Perimeter, Network, Endpoint, Application, and Data Layers -- always considering your unique requirements and considerations.
Deputize your employees to be the first line of defense. We know the Human Side of security is vital to a resilient business. Our program proactively prepares employees to guard against spearphishing and protect company information, with ongoing testing and training.
Complement your in-house Security Operations with our Managed Detection and Response (MDR) solution. Within days, you’ll have protected by 24x7 monitoring of your networks, endpoints, and cloud environments to help you detect, respond, and recover from modern cyber-attacks.
An agile, modern cybersecurity strategy covers all possible entry points. Our six layers of defense give your team the tools you need to turn strategy into action.
Most companies never expect to be the victims of a cyberattack. But ransomware is insidious and undiscerning, striking even the smallest, most unlikely victims. Last year, companies lost almost $1 billion to ransomware. And it strikes close to home.
Recently, a Sacramento-area building restoration company experienced a ransomware attack that completely encrypted and locked down all of the business’s files—many of which were not backed up. The company’s leadership called us after hours, and we deployed an engineer immediately to the company site to diagnose and mitigate the problem. The engineer then worked with the company to develop a new strategy for backup and disaster recovery, as well as ongoing IT security and maintenance.
Upon arriving onsite, our first priority was locating the problem and preventing the virus from spreading further. The engineer recognized the virus as a variation of the CryptoLocker ransomware trojan and quickly removed network access for the servers and shut them down. From that point, the online security community took over searching for the ransomware encryption key, and we turned our focus to disaster recovery and getting the company’s employees back to work.
We devised new strategies for recovery/replacement, backup procedures, and enhanced IT security measures.
Recovery/Replacement Strategy: replaced the servers, firewall, and antivirus, and migrated certain data and processes to the cloud, built the company a new domain network and reengineered their entire environment to be more secure.
Backup/Restore Strategy: devised a backup and disaster recovery strategy for the future, making recommendations for both new policies and equipment. If an attack or data loss happens in the future, we will be able to restore and get the company back to work with less than a day of disruption.
Security/Maintenance Strategy: identified the entry point as a vendor account and worked with the leadership to create a more robust security and equipment maintenance strategy that limited access and trained employees on security roles.