In today’s global environment, you need to be confident that not only your IT network is secure that you prepare for a security breach, you are alerted to the breach and you contain it.
Cyber-attacks are many and varied, and server attacks can cost you money, affect your operations, or take your business website offline. For these reasons, every modern organisation must have a comprehensive IT security strategy to protect their data and IT infrastructure.
Legacy design on-premise or hybrid cloud networks can be at risk as technology and vulnerabilities move so quickly. From experience we have in-depth understanding of these risks and can re-design or harden legacy networks to minimise and mitigate a security breach.
Cloudflare DDoS Protection
Use Cloudflare to protect against a DDoS attack
Secure Network as a Service
Securely work from anywhere without your own network firewall with network as a service
Dark Web ID Monitoring
Most hacking related breaches linked to weak passswords – user credentials are a vulnerability
Email Phishing Simulation
Over 90% of security breaches linked to human error
Mercury IT offers managed cyber security services that are accessible to organisations of all sizes, from small businesses to Trans-Tasman corporates, and are tailored to your budgets and individual security requirements. We review and work to the CIS Benchmark Controls
We design, implement and maintain a comprehensive approach to cyber security management with multiple levels:
Workstation and device security including antivirus, spam and malware protection
User identity and access management including 3rd party application use
File Encryption at rest solutions for highly sensitive data
Microsoft 365 security integrated with InTune and workstation hardening
Restriction of privileged accounts and need to have access Just In Time and Just Enough Access
Backups that extend to include a 4th copy that is immutable and/or a cold storage backup solution
Ensure Email integrity
Asset discovery tools
Password policy, management and tools
Software asset management and application allow listingand ring fencing of applications
Wi-fi and internal network security
Hosted and on-site firewall and perimeter network management and security
Regular external vulnerability and penetration testing
Desktop and device encryption
User security policies
Our hosted firewall service creates a secure perimeter, preventing against unauthorized access to your network infrastructure, and prohibiting access to inappropriate web content, restricting downloads of infected files, and enabling secure use of your network. It can also be customised to allow employees to secure remote access to company resources.
DDoS protection – Uses Cloudflare to protect against a DDoS attack.
Secure Network as a Service – Perimeter 81 allows your team to securely work from anywhere without your own network firewall device and VPN licenses.
Dark Web ID detects your compromised credentials in real time on the Dark Web. With over 80% of hacking-related breaches linked to weak, reused or stolen passwords, user credentials are emerging as the top vulnerability for businesses.
Email Phishing Simulation tests your employees on how they will respond to real-life phishing attacks. With over 90% of security breaches linked to inadvertent, unintentional, and caused by human error.