Network/Internet Setup & Security

PROTECT YOUR ORGANIZATION'S NETWORK FROM CYBER ATTACKS

Major corporations aren’t the only businesses at risk for a cyber attack or data breach. Organizations have a lot of valuable data that hackers want to target – from financial accounts to employee information.

Our 360-degree approach to network security helps protect your network, covering a vast range of security challenges. To do this, we do a thorough review of your people, processes and technology.

This helps us identify any issues and proactively address them, before they can be exploited.

COMPREHENSIVE REVIEW OF YOUR ORGANIZATION DATA

To do this, we start by gathering a complete set of your school’s data to assess it for any vulnerabilities.

This includes:

  • Information derived from vulnerability/compliance scans, along with suggested remediation tasks
  • Information derived from an enterprise-wide network scan
  • Information collected through deployment of a monitoring tool for all network devices to determine operational software, patch updates and anti-virus definitions
  • Results of current state assessment and desired future state goals (both organizational and technical)
  • Review of suggested critical projects and timelines
  • Review of current open requests
  • Review of policies and regulations that may be applicable
  • Market intelligence and market trends

PUTTING A COLLABORATIVE PLAN IN PLACE

Once the ACS team evaluates all this information, we work with your school’s management team to collaboratively review each issue and assign a risk level – either low, medium or high.

This collaborative process allows all stakeholders to understand the priorities assigned to each issue and its significance to your organization’s overall mission. This is an ongoing process as risk levels may change as issues or projects are resolved.

Here’s the process we follow:

  • Meet with stakeholders to discuss the list of identified risks
  • Assign priorities – from low to high
  • Execute tasks based on priority
  • Re-assess and possibly re-assign priorities at regularly planned intervals
  • Re-align risk levels after annual assessment is completed. This will be done each year and usually 1-2 months prior to budgeting process

DEALING WITH DATA BREACHES

In addition to this ongoing network security plan, the ACS team will also be monitoring for any data breaches or cyber attacks. In the event of a data breach, the ACS team will:

  • Notify the organization’s operations team with the known facts of the breach
  • Identify the open platform and start with a lockdown to avoid any further issues
  • Perform a root cause analysis and report it to the management team along with a detailed cleanup plan
  • Keep the designated point of contact continuously informed on progress until issue is solved

COMMON CAUSES OF DATA BREACHES

While there are always exceptions, there are six ways that most data breaches happen in an organization.

They are:

  • Simple or obvious passwords – usually the easiest way a security breach can happen
  • Hacker gaining access to user passwords, file access and VPN access
  • Systems (OS and application) not being up-to-date
  • Old definitions of anti-virus
  • Former employees’ accounts not being locked down right after departure
  • Lack of policies on password sharing between users

ANTI-VIRUS, ANTI-SPAM PROTECTION RECOMMENDATIONS

As part of this annual review, ACS also continually evaluates the anti-virus and anti-spam offerings, and may switch out products on a yearly basis to provide the best protection possible.

We know what a single virus can do to users and to an entire organization environment. We are currently aligned with multiple vendors (Symantec, Malwarebytes, Avast, Kaspersky, Bit Defender and PC Matic) and their offerings include a mixture of both cloud-based and/or in-house hosted solutions.

Anti-virus and anti-spam solutions are only as good as the definitions that have been downloaded. To ensure that the definitions have been downloaded, the central consoles will be monitored and corrective action taken immediately.

PROTECTING YOUR ORGANIZATION'S DEVICES AND ASSETS

In order to ensure that your network and devices are protected, the ACS team will ensure that all the following is done:

  • All desktops and laptops have an instance of anti-virus software running
  • All servers, except for an exempt few, run similar server-based software
  • Installing an anti-virus/anti-spam service to screen all inbound and outbound emails
  • Alerts are sent to all users regarding potentially harmful viruses that may “invade” a user’s mailbox
  • Strong firewall-based content security software is installed to provide an additional layer of protection
  • Security is implemented for internet browsing
  • ACS’s 360-degree network security review helps ensure that all your data, devices and infrastructure are protected from hackers. Don’t let poor planning or data security practices make your organization an easy target.

Our Solution helps

Device Procurement

Device Procurement & Setup

Our Device Procurement Partnerships
Help Us Pass The Savings On To You

Software & Applications Support

Software & Applications Setup

Streamline Your Organization’s Software, Applications Setup

New Facility Setup

New Facility Setup

Planning A New Office Facility?
Start With A Strategic Technology Plan

Network Internet Setup & Security

Network/Internet Setup & Security

ACS’s 360-Degree Network Security Approach Protects Your Organization’s Infrastructure

Data Backup & Disaster Recovery

Data Backup & Disaster Recovery

Protect Your Organization’s Valuable Data With A Comprehensive Data Backup and Disaster Recovery Plan