© Systems AXIS Limited,
axisfirst is a trading style of Systems AXIS Ltd. Head Office: AXIS House, 53/55 St Mary Street, Bridgwater, Somerset, TA6 3EQ. Registered Company 2370905 | VAT No. GB 515 8599 12
around 70% of companies go out of business after a major data loss.*
*According to the Department of Trade and Industry (DTI)
As threats evolve, it has become clear that no one security product is a silver bullet and that the best approach to securing data and your business is to combine several complementary products that each specialise in protecting against a specific attack.
Whilst it is impossible to guard against every threat and protect every piece of data, a layered approach to network security provides peace of mind within a sensible budget. Our security suite offers proactive, behavioural and reactive solutions to securing your network and the data contained within it.
Most cyber-attacks exploit basic vulnerabilities. More than 90% of targeted attacks start with an infected email and these threats are always evolving.
Updating your hardware and software security can be a meaningless exercise if the end users in your organisation are not properly trained. Humans are the Achilles heel of cyber security!
This well-established cyber security training teaches you how to be more cyber security conscious through a series of entertaining and engaging videos and games. It only takes one person to cause a security breach, that’s why our modules are designed to deliver essential cyber security information concisely.
Cyber security evolves daily. Stay one step ahead or at least up to date. Do not assume that policies that were protecting you yesterday, will protect you tomorrow.
Understand how to minimise risk and prepare your business for regulatory auditing for the data you collect, create and store. Our consultants ensure you are adhering to both internal and external policies regarding the use of IT that encompass intellectual property, commercial and personal data.
By its own definition; compliance is operating in accordance with industry and government legislation to improve your business and its data by the security policies and operating procedures you adopt to protect it. With the implementation of the General Data Protection Regulations (GDPR) in 2018 it is even more important to understand your responsibility for data.
Since 2014, it has been mandatory to have Cyber Essentials certification if you have any public sector or local authority contracts and holding this badge also enables your business to tender or bid for new contracts of this type. Cyber Essentials is a UK government scheme based around five controls that give you a high level of cyber security without the enterprise level cost. These five basic controls provide a simplified framework unlike that in ISO 27001.
The five controls are Firewalls, Secure Configuration, User Access Control, Malware Protection and Patch Management.
Learn about CyberSmart, an automated two-part platform which helps you attain and maintain Cyber Essentials certification
Having access to a copy of your data reduces the impact and downtime should the worst happen to your data. Physical threats like fire. flood or theft can be mitigated with online/cloud backup solutions.
But an offsite backup may take several hours to restore depending on the amount of data and the speed of your internet connection. Therefore onsite backup should still have a place in your disaster recovery strategy.
Redundancy / Fault Tolerance
You can protect your data from hardware failures and infrastructure failures by building redundancy into the design of your network and file storage. This means that if for example a hard disk drive were to fail in your server, a copy of the data is still held across the remaining disks. You can strengthen this further by adding redundant hardware into the design which increases the tolerance to faults and eliminates single points of failure in your IT system. Whilst this may add cost upfront, you are protecting your data and business in the event of a failure.
When you build a disaster recovery plan, there are two key factors which you must consider and decide which are the priority for the business. Whilst in an ideal world you want every last piece of data recovered in a catastrophe, the amount of time to achieve that may not be justifiable from a downtime and lost productivity perspective.
Your Recovery Time Objective is your target time for being back up and operational after a disaster. This could be minutes, hours or days depending on each scenario and is a metric by which you are aiming to achieve.
Your Recovery Point Objective is the point at which you want to be back operational within your recovery time objective and again this may vary for each scenario. This could include your email systems. line of business applications, operational files and folders, etc. You plan out what is critical, what is important, what is nice to have and what can wait and factor that into your strategy.