Subscribe
About

Telspace provides consulting, management, support and implementation of IT security.

By TelSpace
Johannesburg, 14 Oct 2002

Just as this letter got to you, just as easily your network could be broken into.

Due to the recent boom in Internet availability, many companies are connecting their businesses to the Internet via permanent links with little or no security procedures. Most of these organisations already have highly skilled IT staff in place, however many of these engineers do not have the background or relevant skill set to properly protect their corporate network and servers.

Questions you should be asking include:

* Does your company have an Information Security Policy?
* How many fail safe`s do you have in place?
* What measures are there to prevent corporate espionage?
* How often are backups done?
* How often do you test the integrity of data that`s backed up?
* When was the last time you implemented bug fixes on your file servers?
* Do the bug fixes you have implemented open any new security holes?

Thankfully, although these are the questions you need to be asking, you don`t need to be the one answering.

Telspace provides specialist services to help you answer any one of these questions (or all of them and more) according to current best practices as well as providing full documentation about what we have done and why.

IT security is a rapidly changing field, and software that is secure today, may be vulnerable tomorrow. We believe that security isn`t a once off investment but rather an aspect of IT that should be integrated into the business. Security starts with each employee.

No two clients have the same business, and therefore no two clients have the same needs. Because of this, Telspace will analyse your business model and structure our IT security assessment around your business`s particular role and services.

Our objective is to do independent IT security risk analysis, which we in turn use to provide a complete report for your network to show you where your security is lacking and why. We can also use these details to deliver the intended security, whether it is a small bug fix, or a full-scale firewall solution with VPN tunnels and complete authentication.

Services

Information System Security is usually one of the most neglected areas of a business network but it is the most important method of protecting your business online. It is a must for all businesses and should not be taken lightly - because of this, the services we offer are designed to check several aspects of system security. Based upon these findings and the level of security your network or server machine already has, we offer solutions and services such as: Information Confidentiality How much information can we find out about your specific network and servers and how much private company information can we get without authorised access?

System Integrity

* How much can your network and servers handle?
* What is the workload like and WHY?
* Can you improve performance without changing hardware?
* How close are your systems to the high-water mark?

File and system permissions

Many default installations leave backdoors into the system that can let a normal user with malicious intent destroy files. We will set permissions as they are supposed to be, and check for backdoors, which may allow unauthorised access.

System Policies

* Does your network have the necessary system policies?
* Do normal users have administrative rights or access to files they shouldn`t have?

User Password Policies

* How often do your users change their passwords?
* Are your users required to have passwords of a certain length?
* How easily can the password file be cracked?

Complete Remote "Hackability"

* Total system security tests, including a detailed report and analysis of your network and servers.
* Up to date reports of exploitable daemons and system vulnerabilities.

Ports and RAS

* Do you have ports which are unnecessarily open, that can lead to data sniffing and security breaches?
* How secure is your RAS dial-in site?
* How much internal access can users get from your RAS?

Outsourced system security

Telspace provides a service which reduces:

* Complexity of IT Security
* Risks which are associated in IT
* Cost of IT Security

Telspace includes the following in MSS packages:

* Monthly or weekly or DAILY reports
* Network Monitoring
* Specific Network Maintenance according to hourly contract
* System Security Updates
* Internal and External Network Assessment

This service is different for each company, and we negotiate for your specific business needs - after making an assessment of your network.

If you are interested in keeping hackers at bay, keeping your information secure, having your network secured, making a security policy or even just asking us about our security packages, please feel free to contact us.

Share

Editorial contacts