4 Tips to keep in mind when Updating your Software
Did you know that October is Cyber Security Awareness Month?
Cyber Security Awareness Month – observed every October – was created to ensure everyone has the resources they need to stay safer and more secure online.
The overarching theme for Cyber Security Awareness Month 2020 is “Do Your Part. #BeCyberSmart.” The theme empowers individuals and organisations to own their role in protecting their part of cyberspace, with a particular emphasis on the key message for 2020: “If you connect it, protect it.” If companies do their part – implementing stronger security practices, raising employee awareness by training employees – our business world will be safer and more resilient for everyone.
At eVantage Technology, we want to ensure that these security services and solutions are readily available to you and your company to stay safer and more secure online. We understand that COVID-19 has reduced most companies’ revenue resulting in tighter budgets. Hence, we want to help you through this uncertain time by providing you with the security services and solutions that your company needs right now to be cyber safe!
We have thus curated 4 Special Service Offers & Bundle Promotions exclusively for you this October!
October Cyber Security Month Service Offers
Service Offer #1
1 week FREE trial*
Cyber Security Awareness Training Program
+ SetUp Fee Waived
*1 week FREE Cyber Security Awareness Training trial for up to 5 learners + a waiver of one-time setup fee if subscribed within 1 month from the end of the trial
*Book an appointment with us and get a 30 minutes FREE virtual IT consultation
Service Offer #2
$1,199* (U.P. $1,799)
Internal Vulnerability Assessment
Save $600!
*Get your Internal Vulnerability Assessment for up to 50 devices at $1,199 (U.P. from $1,799)
*Book an appointment with us and get a 30 minutes FREE virtual IT consultation
October Cyber Security Month Bundle Promotions
Bundle Promo #1
FREE Phishing Simulation
Cyber Security Awareness Training Program
Managed Security Services (Email or Firewall)
+ Free Cyber Security
*Subscribe to one of our Managed Security Services and get a FREE real-time email phishing simulation + an additional FREE one month subscription to our Cyber Security Awareness Program
*Book an appointment with us and get a 30 minutes FREE virtual IT consultation
Bundle Promo #2
FREE VA & Phishing Simulation
Cyber Security Awareness Training Program
Managed Security Services (Email or Firewall)
Internal Vulnerability Assessment
+ Free Cyber Security
*Subscribe to one of our Managed Security Services and get a FREE real-time email phishing simulation + an additional FREE one month subscription to our Cyber Security Awareness Program
*FREE Internal Vulnerability Assessment for up to 5 devices
*Book an appointment with us and get a 30 minutes FREE virtual IT consultation
I am Interested!
Want to find out more about each service?
About our Cyber Security Awareness Training Program
Our Cyber Security Awareness Training Program enhances company’s cyber security by delivering an effective cyber security awareness program to your staff, offering a complete solution to test, train, measure and mitigate human risk.
Online Awareness Program
Each month you will receive an email with access details to complete a short online awareness program. These must be completed within 7 days of the due date. Although we maintain controls to help protect our networks and computers from cyber threats, we rely on the end users to be our first line of defense.
Simulated Phishing Attack
You will receive a simulated phishing attack from time to time. 'Phishing' is the most common type of cyber-attack that affects organizations like ours. Phishing attacks can take many forms, but they all share a common goal of getting you to share sensitive information such as login credentials, credit card information, or bank account details. The goal of our phishing simulation is to provide you with a safe, simulated environment where you can experience what a real phishing attack looks like. If you happen to click a simulated link, you will be automatically enrolled in the phishing security training.
Reporting
A Behavioral Analytics to identify Engagement and risks and a detailed reporting of results would be done by our Security Team.
About our Managed Security Services
Our Managed Security Services is a subscription-based security services includes outsourced monitoring and management of client’s security system and devices.
Fully Managed Services
Fully Managed Security Services is an option where eVantage owns the security technologies and manages and monitors the security events including the critical hardware components such as Firewall, IDS, Wireless routers etc.
Partially-Managed Services
Partially-Managed Services has the option of hybrid/partially own the security technologies if the client has already purchased or owns the security
About our Internal Vulnerability Assessment
Our Internal Vulnerability Assessment is done to identify, quantify and prioritize the weaknesses in a system.
A Full Scan vulnerability assessment would be done in either for the Internal Network IP’s or a website and a complete reporting would be created. Report with each weakness will have its own remedies.
-
What is the difference between an Internal and External Test?An Internal Test means that our tester will be onsite, simulating an internal breach by someone in your office. For example, our tester will simulate a hack into your company’s servers from within your network – either over WiFi or plugged into your network. An External Test means that our tester will try to hack into your company’s system from outside your network or anywhere in the world. For example, our tester will simulate a hack into your company’s website from a Starbucks or even from Indonesia.
-
What is the difference between VA and PT?Vulnerability Assessment (VA) is an assessment that will only assess the vulnerabilities in your environment without testing for confirmation. It is basically a non-intrusive assessment. For example, when you see a GP doctor for a Knee Pain, a general assessment will be provided and the doctor will then advise you to rest, apply some cream, and monitor. Penetration Testing (PT) includes VA, but with the additional testing for confirmation. This means that the assessment will comprise of both the assessment for vulnerabilities in your environment, as well as testing to provide proof of breach. For example, after seeing a knee specialist for the bad knee, the doctor will assess it, before conducting some tests to simulate the pain in order to confirm the right prognosis, and apply the most suitable and effective follow-up treatment.
-
What is the deliverable of the tests?2 reports will be provided for both VA and PT – one after each round of testing.
-
What is the process for testing?There will be 2 rounds of testing. 1st Round of Testing – by eVantage Technology Based on the Client’s requirements, the 1st test will be conducted. A report, which includes the current vulnerabilities, proof of breaches (where available), and recommendation to address the risks found, will be provided to the Client. Rectification Work – by Client The Client is then tasked to follow the recommendations provided in the report to secure its environment before a 2nd test will be conducted. 2nd Round of Testing – by eVantage Technology After the rectification done by the Client, a 2nd test will then be conducted to ensure the environment has been successfully secured. After the 2nd test, a second report, which includes the current vulnerabilities, proof of breaches (if any), and recommendation to address the risks found (if any), will be provided to the Client. However, do take note that there should not be any vulnerabilities found in the 2nd test if the client chooses to follow the recommendations provided in the first report and effectively secures its environment.
-
How long will the entire process take on average?The length and duration of the entire VAPT process will depend on the scope of test and the time required by the Client for rectification work. Hence, it is important for the Client to provide us with a rough projected timeline when filling in the form above, in order to minimize any potential delays in entire process.
Our Latest Cyber Security Stories
Let's Work Together
Get In Touch with us today so that we can help you fulfill your business' IT needs.