Skip to main content

Layered Cyber Security Approach

Click To View Larger Image

Vigilant IT employs a multi-layered cyber security strategy that is designed to protect your network, and data.

By integrating multiple solutions, we ensure that our defense mechanisms work in tandem, mitigating risk versus reliance on a single solution. This approach enhances overall security resilience and allows us to effectively respond to evolving cyber threats.

Minimum Recommended Security Standards:

  • Business Grade Managed Antivirus
  • Patches installed upon review within 7 days, Servers within 30 days
  • Non-critical and 3rd party OS and Device patches installed within 30 days
  • Critical Firmware/Driver updates installed within 7 days
  • Business Grade Unified Threat Managed Firewall providing Content Filter, AV, AM, Intrusion Prevention
  • Critical data backed up daily, tested bi-annually
  • All systems storing sensitive data must be wiped to ISO-27001 standards upon decommission
  • All portable devices storing sensitive data must use disk encryption technologies
  • All USB/CD/DVD’s containing sensitive information must be encrypted

Additional Recommended Standards:

  • All systems not behind the Business Managed Firewall must have Anti-Breach/Anti-Intrusion software
  • All networked computers to have real-time Suspicious login detection, Automated daily investigations and remediations, and PII/PHI detection.
  • All shared files/folders must be in a security-driven solution such as Windows Server File Server, Datto Workplace, or equivalent.
  • All email accounts must have 2-Factor Authentication enforced (2FA)
  • All industry-specific SaaS software (internet-based production systems) must have 2FA enforced
  • Email providers must match compliance requirements. We have found Microsoft 365 and Gsuite to be the most reputable services
  • Security Awareness Training campaigns to be actively deployed to train employees and users on phishing attacks
  • All endpoints are monitored by a 24/7/365 solution that monitors resources: CPU, Storage, Memory utilization
  • Production Server’s to be pro-actively managed in a plan with at least once/month of after-hours maintenance (preferably twice)
  • Enhanced Network Monitoring to be enabled on all networks with over 50 devices
  • Email Encryption Services with Enterprise SPAM filtering

Service

Provider

Terms & Conditions

Privacy Notice

Antivirus

Huntress Labs Multi-Layered

Backup & Recovery

Datto

Backup & Recovery – Microsoft 365

Backupify

DNS Filter

TitanDNS

Darkweb Scanning

DarkwebID

Coming Soon

Documentation

ITGlue

Managed Detection & Response (MDR)

Huntress

EDR (Antivirus / Malware)

Datto EDR

EDR (Antivirus / Malware)

Rocket Cyber

Helpdesk Ticketing

Datto

Remote Monitoring & Management (RMM)

Datto

Coming Soon

Privileged Access Management (PAM)

ZeroTrust

Threat Locker

Office 365

Microsoft

Coming Soon

Network Management

Auvik

Multi-Factor Authentication

DUO

Workplace/Gsuite

Google

Spam Filtering

Proofpoint

Spam Filtering

Barracuda

Spam Filtering

Datto SaaS Defense

Password Management

MyGlue

Name(Required)

Free Network Assessment

Vigilant IT offers comprehensive network audits to identify risks and vulnerabilities, providing a detailed analysis of your network assets and helping you create an IT plan.

These assessments include a summary of network risks and vulnerabilities, asset details, firmware currency assessment, and patch management. Regardless of whether or not you choose to engage with Vigilant IT, you’ll receive a valuable report outlining your current IT state.

Schedule your assessment by calling 801-563-9700 today or complete the form to the left.