REAL-TIME VISIBILITY INTO ACTIVE GLOBAL CYBER ATTACKS

REAL-TIME VISIBILITY INTO ACTIVE GLOBAL CYBER ATTACKS

First, some facts:

  • “MyDoom” is the most costly computer virus to attack the world wide web, costing a total of $38.5 billion in damage.
  • 600,000 Facebook accounts are compromised every single day.
  • Humans are the weakest link when it comes to cyber security, which is why psychological manipulation of cyber attack victims is so common.
  • Just one single cyber crime ring based in Europe managed to steal $1 billion from 100 different banks in 40 different countries.
  • 68% of funds lost as a result of a cyber attacks were declared unrecoverable.
  • The average time to detect a malicious or criminal attack is 170 days (nearly 6 months). 
  • From 2010 to 2015 there has been a 176% increase in the number of cyber attacks, with an average of 138 successful attacks per week.

 

Here’s how we go above and beyond to protect your privacy and personal information:

  • Our website employs the latest in ’point-to-verify’ technology which shows real time verification of our business credentials.
  • Website security containing 2048 bit signatures and up to 256 encryption with the highest possible levels of security for our customers and clients.
  • Authenticated email communications with digital signatures and document encryption as needed.
  • Real-time, fully monitored network threat and intrusion detection.
  • Warrantied for potential damages from cyber crime.
  • Automatic backups into the cloud – protecting your data from system crashes, known viruses and physical damage – while employing password protection and state-of-the-art, secure web-based access utilizing Secure Socket Layer encryption.
  • Strict data destruction policies that ensure the integrity of your personal information.
  • Locations containing servers and/or physical data incorporate numerous on-site security features including locked offices, clean desk policy (ensuring all sensitive documents are filled in locked cabinets), 24/7 video monitoring and monitored alarm service.
  • Locations containing backup servers house duplicates of our encrypted files at an off-site data center, and store them across a redundant array of enterprise-grade disk drives. Datacenters are guarded 24-hours a day and are additionally protected by:
    • Temperature control
    • Uninterruptable power supplies (UPS)
    • On-site emergency backup generators with guaranteed fuel contracts
    • Tightly restricted personnel access using biometric scanners
    • Server access controlled with electronic key cards and PIN codes
    • Guards on duty 24 hours a day, 365 days a year