Network Security Services

Expert security solutions for your network and servers.

  • Network health check
  • PCI compliance
  • Server hardening
  • Anti-virus / firewall
  • Intrusion detection
  • Two-factor authentication
  • Penetration testing

Network Health Check

A network health check is designed to test the performance and security of your network, in order to make sure that your network is secure, reliable, and operating to its maximum efficiency.  We ensure that the following areas are covered, and we will also provide recommendations on how to address any issues raised:

  • Data backup is performed regularly and securely
  • Your network is protected from hackers
  • Your infrastructure is sufficient for your needs
  • Your mail is efficiently filtered for spam/viruses

If you need a second opinion, to ensure your IT company is providing the best support, please get in touch.  Our work is always completely confidential.

PCI Compliance

Payment Card Industry Data Security Standard (PCI DSS) is a standard designed to promote secure credit card payment processing, and to prevent credit card fraud.

This is achieved by ensuring that merchants meet minimum levels of security when they store, process and transmit cardholder data.

We can apply server hardening techniques, along with maintaining security via updating and pro-active monitoring and the implementation of security policies.

Server Hardening

We have many years experience with Windows, Linux and BSD servers, and ensuring that world-facing servers are secure.

To ensure that servers are secure against external attack we make sure that specific factors are covered, such as:

  • Up-to-date operating system version installed
  • Latest software patches applied
  • Secure user access permissions
  • Secure passwords
  • Removal of unnecessary software and services
  • Hiding of server signatures
  • Intrusion detection
  • Firewall installed and optimally configured
  • Anti-Virus installed and maintained

Two-Factor Authentication

Also known as 2FA, two-factor authentication uses two separate methods with which to identify a user.  The first method of authentication is a password known to the user, and the second is via a token generated by a device such as a mobile phone.

By implementing this method of authentication, even if a password is divulged you will still retain the second level of security, preventing data theft.

Penetration Testing

A penetration test is a method of evaluating the security of your network.  It will attempt to exploit any existing vulnerabilities within your network, or Web servers, indicating whether or not you have sufficient security, and reporting on any issues discovered.  Our tests are extensive and, depending on the size of your network, can take many hours to perform.

As well as reporting on areas where your network is insecure, we will also provide solutions on how to address the issues.