Welcome to the Enhanced Security Services demo by OSIbeyond.
We will be giving an overview of our Enhanced Security Services, which is designed to provide comprehensive safeguards to protect against and prevent cyber attacks.
These cyber attacks can have a devastating impact on your organization causing:
- Damage to customer/member trust
- Direct financial losses
However, OSibeyond’s Enhanced Security Services consists of 5 main components to proactively protect and prevent against malicious attacks, data compromises, and network vulnerabilities.
- Two Factor Authentication
- Targeted Threat Protection
- Mobile Device Security
- Phishing Security Tests
- Network Vulnerability Scans
Two Factor Authentication
Passwords are becoming increasingly easier to compromise.
They can be stolen, guessed, or hacked, and you might not even know when someone is accessing your account.
However, with two factor authentication, a second layer of protection is provided to secure your online accounts. The primary benefit of two factor authentication is to prevent anyone from logging into your account, even if they know your password.
When you attempt to log into a service protected by tow factor authentication, you’ll be promoted to enter your user name and password.
To access your account you must complete one of 3 authentication methods, using an authorized device.
- Push notification
- Call Me
First, the push notification sends a notification to your device to confirm if you’ve made the request.
Once the push notification has been sent to your device, you will be notified through the mobile app, which is available on iOS and android devices.
If you did not initiate the request, you can choose to deny the attempt and report it for fraudulent reasons.
This triggers an email notification to a network administrator who can block future malicious attempts made against your account.
If you did initiate the request, tap the approve button to access your account.
Second, an automated call is placed to call your device with instructions to access your account.
Lastly, the passcode method sends a 7 digit number via text, which expires 5 minutes after sending.
Targeted Threat Protection
Inbound email attacks are one of the fastest growing cyber threats challenging organizations.
Employee information can be easily stolen, causing irreparable damage to member trust, reputation, and direct financial loss.
Targeted threat protection is an advanced cloud security service that provides multiple safeguard to prevent:
- Malicious links
- Weaponized attachments
- Malware free socially engineered attacks
Targeted threat protection consists of three methods to prevent cyber attacks.
First, attachment protect reduces the threat of weaponized or malware laden attachments used in spear phishing attacks.
Inbound emails with attachments are opened in real-time, in a virtual or sandbox environment, which is isolated form your organizations network.
Staff will receive emails in a safe file format, which strips away any malicious content.
Since the sandboxing checks take place in real time, there is no delay for staff to access content.
URL protection rewrites all inbound email URLs to block the threat of a malicious attack. When a link is clicked, regardless of the device, the destination website is scanned in real-time.
Security policies can be set to instantly restrict access when a link containing phishing content is detected.
When a malicious link is clicked, staff are shown a blocked page preventing access.
URLs containing suspicious file extensions, such as .exe, which is used to spread malware, can be blocked to further safeguard your network.
In addition, user awareness is a feature used to provide network administrators with a way to track staff prone to clicking on bad links.
Impersonation protect defends against the rapidly growing threat of whaling, commonly referred to as CEO fraud.
By marking key indicators of these socially engineered attacks, suspicious emails are blocked and labeled as potential threats.
Similar internal domain provides protection from inbound messages where the senders domain looks similar to any of your internal domains.
Targeted threat dictionary identifies key characteristics in the body, subject, and header of the email.
This provides an additional layer of protection to prevent cyber attacks from accessing sensitive or financial information.
Enabling number of hits, and selecting 2, requires at least two of the identifiers above to be triggered before any action is taken.
This features prevents false positive detections from blocking safe traffic.
Mobile Device Security
Mobile device security provides a way to easily maintain and secure smartphones and tablets.
Granular security policies help to proactively prevent unauthorized devices from compromising your network.
Regardless if they are owned by your organization or by your employees
Complicate enforcement rules can also be sent went a device is out of compliance.
Group can be created to specify security policies:
- Globally to all device
- By device type
- Employee owned devices
Groups ensure separate security policies are created and enforced, regardless if they are organization owned or employee owned devices.
In addition, custom groups can be created to set policies for individual departmental use.
Granular compliance rules can be set to ensure devices connected to your network do no pose a security risk.
Enforcement rules ensure all devices are in compliance by keeping operating systems up to date.
Preventing black listed applications from not being used on devices.
And preventing jailbroken or rooted devices from accessing your network.
Similar to group security policies. You can set compliance rules to specified devices, or by department.
In the event a device is out of compliance, an email notification will be sent to a network administrator.
Furthermore, granular security policies can be set to specified devices based on the groups created, or globally to all groups.
For example, passcode policies can require devices to include:
- Minimum passcode length
- Set a passcode expirations
- Auto lock idle devices after a set period of time.
Phishing Security Tests
Phishing security tests are a highly effective way of preventing socially engineered attacks.
Detailed reporting metrics track:
- Links clicked by staff
- Email attachments that have been opened by staff
- Staff replies to emails
OSIbeyond will provide remedial online training to prevent future network compromises in the event staff fall for the simulated attack.
When phishing security tests are implemented, staff will receive emails at random, promoting them to take an action or provide personal information like their username and password.
In this case, the sender, [email protected], is informing staff of a security breach and that they should click the link to change their password immediately.
Once the link is clicked, a familiar destination page will appear, promoting staff to sign into their account.
If staff fall for this attack, a page will appear notifying them of the simulated phishing test.
Remedial online training will be provided to inform, educate, and prevent staff from future security compromise.
This training will be provided in a video format, with real life use cases of the malicious attacks.
In addition, built in quizzes test staff’s knowledge and understand of potential cyber threats.
A monthly report of the simulated phishing attack will be provided, showing an overview of all activity.
Individual user actions are track to show who are most at risk to phishing attacks and therefore may warrant additional in person training.
Network Vulnerability Scans
Network vulnerability scans consist of a 3 step approach to proactively securing your network.
- Monthly internal and external scans
- Remediation of high or critical threats
- Detailed monthly reports of overall health of network
Completed scans show the total number of threats and assess each one by severity (low, medium, high, or critical).
In the event a high or critical threat is detected, OSIbeyond will provide remediation preventing any data or network compromises.
All other threats will be presented in a monthly report.
These monthly reports provide documentation that your organization is taking proactive measures to secure your network.
How to Prevent Cyber Attacks
Organizations can no longer afford to ignore the risks, as cyber attacks become more widespread and sophisticated.
A breach in your network can have a devastating impact, making cyber security an essential component of your technology operations.
As you’ve seen with OSIbeyond’s Enhanced Security Services, a holistic approach is delivered by adding multiple layers of security.
These proactive measures protect and prevent cyber attacks that would otherwise compromise your organization’s technology systems.