CORE Security

Cyber Operations Reporting & Engineering

The CORE Security program affirms your network security is continually strengthened to help keep up with the ever-evolving risk of cyberattacks.

Our Cybersecurity Engineers and vCISO (Virtual Chief Information Security Officer) will work with your firm to provide a holistic approach to cybersecurity using people, processes and technology. This comprehensive approach will allow us to successfully prevent, mitigate, and remediate more cyberattacks successfully.

Traditional security measures for a network consisted of applying patching and installing a firewall which are very minimal techniques for building a defense. An easier way to explain our CORE Service Program is by likening it to securing your home prior to leaving. You would want to do all that you could to prevent a thief from breaking in. You might lock your doors and windows (firewall and patching). While this is Important, it will not stop a thief that has been casing your house for a month and knows your patterns. If an intruder is persistent, and really want in, they could use tools to pry open doors or break windows.

The same concept applies to intruders wanting access to your network. Hackers and cybercriminals are using new tools and techniques to bypass traditional cybersecurity measures. Our CORE Security Program will allow you to fully protect your “home.”

Contact us to learn more about our CORE Security Program.

CORE Security Services

cyberico6

Vulnerability Management

Using the home security analogy, if a door or window was left unlocked, Vulnerability Management mitigates that threat and makes sure that ALL your doors and windows are locked.

VM is the process of identifying threat vectors that criminals can use to gain access to your network. These are usually OS and non-Microsoft applications (i.e., Adobe, Flash, etc.). As new vulnerabilities are identified, your network should be tested regularly to identify new access points and patch or reconfigure them on a regular basis.

cyberico7

Security Operations as a Service

SOCaaS acts as your home’s surveillance system. If an intruder is lurking around outside or trying to gain entry, you want the authorities to be notified as soon as possible. The best scenario is that you would have a recording of the intrusion to know exactly what method he used to break in and exactly what was stolen so that it can be prevented in the future and your items can be recovered.

SOCaaS monitors all network connectivity to identify unusual activity that could represent a security breach. Highly trained security engineers monitor your network 24/7 utilizing a combination of software and hardware to monitor access, log-ins and inbound/outbound network traffic.

cyberico-mobile

Multifactor Authentication

The risk with passwords is if someone other than your authorized employee gains knowledge of that password then your data can be compromised. By utilizing a second method of authentication we can mitigate this risk by forcing a would-be attacker to also need access to a cell phone or key fob (something your employee has). By requiring multifactor authentication we can further prove the identity of the personlogging into your firms network.

Using multifactor authentication in your environment will also provide a mitigating control to other attack vectors like password spraying or brute force attempts (techniques hackers use to compromise a network). Some MFA products allow for a wider variety of authentication methods which make it even easier for your employees to log in and press a button from a push notification method instead of keying in a series of numbers.

cyberico5

DNS Malware Filtering & Protection

Now that we have the inside and perimeter of your home protected, we want to make sure that all the roads leading to and from your home are also protected. So, let’s make sure we can monitor a suspicious vehicle pulling down your street and passing by your home a couple of times. If there’s an APB out for a red Corvette and it’s driving up and down your street, you want to know that it’s not going to make it into your driveway so you block it in advance and alert the authorities.

DNS Malware Filtering & Protection utilizes software to block internet traffic to and from potentially “poisoned” sites on the Internet. It represents the most effective prevention of malware, crypto and/or intrusions as it blocks traffic from known bad sites across the globe. It can also be used to provide high-level category filtering and reporting.

Cybersecurity Logos

CORE Security Additional Services

The CORE Security Program includes additional services that are important overall network security.

  • Office 365 Security Consultation: Our security team works with your business to determine the correct measure of controls that should be turned on to mitigate data loss and secure your cloud system.
  • Phishing Training for Employees: Employee training and spear phishing simulation campaigns empower users to recognize email threats not only at work but also from devices that are not protected by corporate email gateways.
  • Threat Hunting: using their own knowledge and familiarity with the client network our security team hypotheses about potential threats, such as, but not limited to, Lateral Movement by Threat Actors.
  • Email Protection and Management: email-filtering, spam blocking, encryption, archiving,
    anti-impersonation and anti-spoofing by way of domain fraud prevention and backups. In addition, protecting users and data from targeted spear phishing attacks using an A.I. engine that detects threats that traditional email gateways cannot.
  • We’ve grown to appreciate Accellis not as a typical vendor or service provided, but truly a partner in our practice. I trust them completely with our most sacred asset other than our people: our technology. They are knowledgeable, dependable, and innovative. As someone who has a keen understanding of technology, I appreciate the level of skill and expertise that they contribute to our practice. Bottom line for me is that our success can be directly linked to the work Accellis has done.  Our legal professionals, both staff and attorneys, can focus their entire day on the practice of law, as many of the things that Accellis has recommended to us or designed for us all makes our work easier, more efficient, and ultimately more profitable. As with every technology product, we have had our challenges, but they are always resolved. When I’ve needed them in the middle of the night, they’ve been there. I’m thankful each day that they are on my team, and they’ve never let me down.

    Jeffrey Kaman Kaman & Cusimano, LLC
  • On behalf of our firm, I want to extend our thanks and appreciation to Accellis’ tremendous efforts yesterday in responding to the virus/worm that infected our network and workstations.  I was out of the office when the virus hit but from what David, Jeff, Brian and others have reported, Accellis identified the nature and the scope of the issue even before we knew there was a widespread problem of any type.  Accellis responded immediately and in force to root out the problem and restore our systems to working order in just a few hours – if not for those efforts, even we could see that the virus had the potential to shut us down for a much, much longer period of time. As Jeff said, we’ve wondered what might happen in an IT crisis, whether because of a virus, cyberattack, disaster in the server room, or other issue.  Yesterday afternoon, we faced just such a scenario and Accellis more than proved it was up to the task.

    Jay Cusimano Kaman & Cusimano, LLC
  • Wanted to thank you again for scrambling Jason and Dave to the office yesterday to help with the staff move... The move happened before I had expected it to. I’d planned to discuss a plan/strategy with you guys on Monday and then take care of the move with the on-site engineer on Tuesday. Obviously that’s not how it played out. It would have been understandable if you’d been unable to provide on-site assistance on the fly. After all, you had no notice. In fact, I was really calling just to see who might best walk me through some of the issues over the phone. But you rounded up a couple guys and they came and hammered it out without complaint, even staying late to make sure we’d have few issues for the following morning. They were terrific. ... You and the team have been fantastic over the years.

    Greg Thompson Weston Hurd LLP

SAY HELLO!

We would love to hear from you. Let’s have a talk.

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.