DE
EN

IT Audit

  • Would you like to know if your IT infrastructure is up-to-date and well protected?

  • Would you like to check regularly, if your IT users are acting in compliance with your IT guidelines?

  • Do you want to make sure that your computers are solely used and run with officially licensed software?

  • Would you like to detect potentially harmful software and security risks in your IT system to prevent third party exploitation?

SignalBlue can audit your IT setup on potential risks and improvements. This can be on a one-time or recurring basis, while it is naturally rather difficult to change the user awareness within a single session. Therefore, we recommend a quarterly assessment, where we take a look at the IT infrastructure and whether IT guidelines are still followed. In this way we can examine users with a potential risk factor as well as train new users who recently joined the company. This can be especially interesting for the management level, as many companies prefer not to address such problems internally and rather rely on objective observers to maintain the harmony within the company.

Did you know?...

  • "Passwords are like underwear. Don't leave them out where people can see them, change them regularly, and don't loan 'em out."

    A piece of advise from tech expert Chris Pirillo.

  • "The best way to get the right answer on the internet is not to ask a question; it's to post the wrong answer."

    Cunningham's Law

  • ...that 30% of IT security breaches are cause by internal actors.

  • ... that 29.2% of malware are hidden in MS Office or Windows executable files.

  • ... that 58% of the victims of data breaches are categorized as small businesses.

  • ... that more than 99% of the attacks require human interaction to succeed.

     

  • ... that phishing scam costs for businesses added up to $3 billion in the last years.

    Source: Symantec Threat Report

  • ... that the number one threat in breaching IT security systems is through social engineering.

    Source: Phishing as a Service: The Phishing landscape

  • ...that 3.8 million records are stolen from businesses every day.

  • … that 93% of breaches could have been avoided by taking simple steps like two-factor authentication.

  • “Security is always going to be a cat and mouse game because there'll be people out there that are hunting for the zero day award, you have people that don't have configuration management, don't have vulnerability management, don't have patch management.”

    Kevin Mitnick, American computer security consultant, author, and hacker

  • … that 91% of cyber-attacks in 2017 started with a phishing email.

  • … that one of the biggest bank heists was done electronically. In 2016 $101 million were illegally transferred from the Federal Reserve Bank of New York to private accounts in Sri Lanka and the Philippines. The "bank robber" was embedded in a macro of a Word-file.

    Source: wikipedia.org

     

     

Contact us now


SignalBlueA Nowak & Partner Co. Ltd. brand

Internet security cybersecurity IT solutions network support audit remote hacker hacking virus bluescreen backup

 

5Fl. Myeongbong Building
152 Hannam-daero, Yongsan-gu
Seoul 04417, Republic of Korea


Telefon: +82-(0)2-701-4707
E-Mail: info@signalblue-korea.com