If you’ve been paying any attention to geopolitical news of late, you might have heard about the storm around Kaspersky. The Russia-based antivirus firm has been responding to allegations that it collected top secret NSA files from a customer machine and shared them with Russian intelligence agencies.

GDPR is the most comprehensive data protection legislation to date and it's revolutionizing the information security landscape. The impending enforcement of the regulation is forcing organizations to understand, and transform, the way they collect, process and store data.

Cyber attackers target privileged accounts and organizations with weak security practices can easily fall prey to privileged identity theft; the compromise of privileged account credentials. Armed with credentials to administrative and service accounts with access to critical IT assets, an attacker can steal data on an industrial scale.

Two-factor authentication (2 factor authentication or 2FA) is the authentication process where two of the three possible factors of authentication are combined.

The possible factors of authentication are:

  • something the user knows (e.g. a password, PIN code, or answer to secret question)
  • something the user has (e.g. a token, a mobile phone, a USB, a key fob)
  • something the user is (e.g. face or voice recognition, behavioral biometrics, fingerprint, retina or iris scan)

As the date that GDPR will become effective approaches, most organizations are at complete loss and still looking for the right course of actions. We have prepared a solutions matrix that maps certain aspects of GDPR to specific technologies and solutions. If you have any enquiries, do not hesitate to contact us. We are more than willing to help you throught the tedious task of complying to GPDR legislation.

The traditional method through which AntiMalware products detect malware, is by using virus signatures. When a new piece of malware circulates, the AntiMalware vendor receives a sample, analyses that, retrieves a signature from it and updates the Virus Signature Database of its installed base over the world. Using that signa-ture, the AntiMalware can detect the particular piece of Malware with 100% certainty.

Page 3 of 4

Active Care Support Service Overview

Health Check

We proactively perform periodic health checks in your environment

Virtual Replication

We replicate your environment for troubleshooting and reviewing changes

Remote Support

Our engineers connect remotely to your system for immediate support

Support engineer

You have your own personal support engineer

 Copyright © 2019. All rights reserved. Designed & Built by Inter Engineering.