- ProtectNOW
Cyber Security
WeSeeNow has been providing IT Support to clients since 1999. In this time, we have looked after many different types and size of business, charity and not-for-profit organisations. Our modular IT Support packages enable us to meet their differing needs. Adapting our services, whether they are a sole trader, owner of a thriving multi-site small business, or not-for-profit organisation.
If you are looking for a cost effective, personalised experience, NOW is a perfect opportunity to work together. We do more than just react quickly. Proactively maintaining and remotely monitoring your systems 24/7/365 is an essential standard. This means issues are fixed before they can affect your business.
Our cyber security experts bring twenty years knowledge and experience. With this they ensure the specific needs of your IT infrastructure and services environment are fully protected by:
Up to date security measures across your entire network A full IT disaster recovery and business continuity plan Preventative or remedial action we take today is designed to safeguard your computer system and all its sensitive information tomorrow.
From hardware to software or Cloud, our cyber security strategy will protect your business from the constant risk from unauthorised access, misuse, modification, malfunction and disaster.
When it comes to back-ups we’ve got your back.
IT Disaster Recovery and Business Continuity
Looking at your potential disaster scenarios.
Failing to plan is like planning to fail. IT disaster and data loss can cause damage to your business, even in the short term, from reduced or no company productivity to issues affecting current or potential clients. You could also suffer a permanent recovery failure if there is no clear, and up to date backup and disaster plan in place.
To do nothing or to “wait and see” is no longer an option. Your entire operational and information system could be at serious risk if you rely and sit back on outdated solutions. These may no longer provide the level of security and protection needed now.
Our team of experienced IT Support experts believe that a disaster recovery plan should not be unnecessarily complex even though many important factors must be taken into account. We always start by looking at the impact of specific disaster scenarios and designing cost effective options to avoid or mitigate loss.
Working closely together with our clients, we build a bespoke IT business continuity plan underpinned by our range of cloud based backup and disaster recovery platforms.
Recovery Time Objective (RTO)
The Recovery Time Objective is defined as:
- The maximum length of time tolerated for a computer, system, network, or application to be down after a failure or disaster occurs.
- The time period requires careful evaluation as it can vary greatly from business to business or even between departments and staff members.
Recovery Point Objective (RPO)
When a computer, system, or network goes down as a result of a hardware, program, or communications failure, disaster recovery planning (DRP ) will need to identify the Recovery Point Objective. This is defined as:
- The age of all files which must be recovered from backup storage for normal operations to resume.
- The RPO simply goes back in time to the exact instant at which the failure occurred, which is precisely determined in seconds, minutes, hours, or days.
Online Backup Strategy
Most companies and organisations operate some form of system and file back-up procedure in the event of data loss due to a hard drive failure. Unfortunately, a smooth recovery is not necessarily guaranteed if disaster strikes.
The claim that encrypted data is ultra secure may not reveal that the files are often only protected by encryption when copied via SSL (Secure Sockets Layer), the standard security technology for establishing an encrypted link between a web server and a browser. While the data is only accessible by the hosting company, it is not encrypted when held in storage and could be forcibly obtained by a remote attack.
We help keep your sensitive data safe and secure and your business one step ahead. Our knowledge of the latest capabilities and limitations of back-up and storage technology can provide you with full guidance on your specific needs to ensure you are protected with a comprehensive backup and recovery testing strategy.
Hybrid Backup
The ProtectNow Hybrid Backup is a very clever and cost effective solution to maximise your business uptime, designed to allow:
- Systems to run backups more frequently.
- Boot servers directly from an onsite appliance or the cloud – reducing recovering time.
Malware, Virus Protection and Recovery
Not all products are equal
Currently, there are nearly 600 million malware infections identified by security researchers, a five-fold increase in five years, which is expected to soon top 1 billion, worldwide. (Independent IT-Security Institute, 2017).
Most companies and organisations whatever their size, use some form of antivirus as standard. Unfortunately, not all products are equal to defending against the ever increasing variety of virus attacks.
Our experienced IT Support team will carefully assess your individual system needs and specify the correct and appropriate set of solutions and procedures, which will maximise protection of your company and its sensitive data.
Viruses
A virus is basically malware, which can only be spread through human interaction. The malicious lines of code enter a file or computer operating system via an executable file but will only be activated when the user opens the infected programme.
A virus can be easily and unknowingly spread via link sharing among a potentially endless number of machines lacking adequate anti-virus security software.
Trojans
Trojan malware has the ability to hide itself within a normal file, much like the infamous Trojan horse. When a Trojan is activated, the invisible hacker is able to secretly gather information about a computer user’s operations or create a ‘backdoor’ to allow cyber criminals access. One of the most well-known of cyber crimes is to add the computer to a huge network of infected ‘slave’ machines, known as botnets, for conducting DDoS attacks.
Worms
Worms are a particularly insidious form of malware. They can spread between systems without the need for human intervention by using a computer’s in-built data transfer capabilities. A worm can also copy itself to spread to as many machines as possible via email and other digital communication platforms.
Our team will ensure you are made fully aware of how the different types of malware operate. By remaining vigilant and always suspicious of any unusual activity you will ensure your computer network continues to be immune to the deadly infections. See us as IT Doctors .
Ransomware Protection, Preparation and Recovery
54 per cent of UK companies were hit by Ransomware attacks in 2016, according to a Malwarebytes survey. They also found that more than 60 per cent of those surveyed took more than 9 hours to remediate the impact of an attack.
Ransomware is designed to extort money and is now the most common type of malware, which can spread via:
- malicious adverts
- email attachments
- web links
- smartphone apps
The malware will encrypt the files of an unprotected machine or device and demand a fee within a specified time frame to provide the decryption key. Failure to pay results in the loss of the encrypted files forever.
The hard reality is that at some point your system is certain to be affected. WeSeeNow has the specialist knowledge to help you properly prepare in advance.
Ransomware rapidly spreads like wildfire between users, and across multiple machines and networks. More than a quarter of those affected will lose files because they did not pay. Even if you do pay up in most cases you will never see your data again! One in three of UK companies lost files after refusing to pay.
We ensure your critical data is security-managed by deploying automatic, continuous endpoint backup on every machine in your network. Infected devices can then be restored with more certainty to where they were moments before their files were encrypted, requiring less time and effort. You can be up and running on the same day.
Ethical Hacking and Penetration Testing
Penetration Testing
With your permission, our ethical hacking experts will unleash a whole host of hacking and computer attack techniques to uncover security flaws, with the goal of improving your overall security.
Our penetration testing service focuses on finding vulnerabilities in particular target environments belonging to our clients and forms part of our ethical hacking service.
We frequently deal with the process of finding flaws in websites and web applications. The goal of compromising their backend and taking control of them and their valuable data, as part of the penetration tests.
The good news is, once we have uncovered any holes in security, we can help you plug the gaps before the cyber hoodies get the chance to wreak havoc.