Multi Factor Authentication in a Holistic Context

Multi Factor Authentication in a Holistic Context

 

The following is a guest post from Techni Team, an ICT-Full-Service Provider and the distributor for UserLock in the Netherlands.

Guest blog postAs many of you are aware, that when it comes to protecting the ICT infrastructure, many organizations need to rapidly upgrade to a higher level of security. This is particularly true for SME companies. This is evident not only from the staggering number of reported hacking incidents in the last year but also from expert reports published in recent months.

As a result, the industry is now facing a double challenge, since not only are the SME companies behind in their adoption of security measures and -tools, but their supporting ICT vendors are as well. Almost all of these are small firms with less than 5 employees, and consequently lack the right skills and offerings to cost-effectively upgrade their clients to the appropriate level.

Security Services: An approach to help smaller ICT providers

In order to help resolve this “industry problem”, Techni Team has developed a set of Security Services so that smaller ICT providers can quickly and swiftly offer these services to their clients in an economically viable manner and with no upfront investment. Techni Team has broken down this offering into three packs of services named as follows:

  • Compliance Security Pack
  • High-Security Pack
  • Premium Security Pack

The Compliance Security Pack – Completing the Circle

From the theories and practices of Change Management, we know that we need a vision, a logical path, and quick wins in order to sustain the change movement. Thus the vision is to first achieve a certain level of compliance. But compliance to what? To determine this, we created and offer an IT-Assessment instrument that provides a clear picture of the current state of an organization’s ICT infrastructure security.

The results of the IT-Assessment may indicate opportunities for improvement in User Awareness, Access Management, or Data Auditing. All of these opportunities must be addressed in order to become compliant in any shape or form, whether that is to become ISO 27000 certified or to meet the determined security level indicated by the IT assessment.

Together with Techni Team, ICT-providers can deliver on these opportunities by applying DIEV-training, (50 five-minute videos on end-user awareness), MFA (Userlock’s Access Management), or Data Auditing (File Audit from IS Decisions). All of these solutions can be implemented quickly, so together we jointly create fast short-term wins.

Cooperation, not competition

Once the above step is made, the way is paved for further security improvement. As part of the aforementioned High and Premium security packs, the following services can be implemented:

  • Managed Detection and Response (MDR)
  • Privileged Access Management (PAM)
  • Automated Patch and Asset Management
  • Security Information and Event Management (SIEM)
  • Intrusion Detection System (IDS) / Intrusion Prevention System (IPS)
  • Security Operation Center (SOC)

It is important to note that this is all done in cooperation between the client, his ICT provider and Techni Team. Throughout the process, the ICT provider retains client ownership, and they leverage Techno Team’s service and expertise.

More about Techni Team

Techni Team is an ICT-Full-Service Provider for 15 years, focusing on bringing ICT-value to SME companies and Medical Practitioners in The Netherlands. Our approach is pretty non-classical. Rather than charging our customer “by the item” or “by the hour”, we deliver an all-encompassing service for a fixed price per month. Our offerings include VoIP, Workplace hosting, Server hosting, and Secured connectivity. We have recently expanded this offering by a dedicated set of security services, comprising of End User awareness video-training, MFA, IT-Assessment, Endpoint Prevention, Detection, and Response, with more to come. Techni Team’s Information Security Management System (ISMS) is ISO/IEC 27001:2017 certified.

Share this post :

Avatar

Chris is Directeur Général Adjoint of IS Decisions. IS Decisions software offers organizations proven and effective solutions to help protect a Windows Active Directory Network against external attacks and the insider threat.

Secured By miniOrange