Are you sure your IT infrastructure has maximum security? Hackers are becoming increasingly aggressive. Any organisation can fall victim to ransomware, DDOS attacks, phishing emails and the like. In doing so, hackers often exploit small mistakes in the configuration of an IT landscape. Think of an incorrect setting or a patch not yet applied.
Information security is a continuous process that depends on alert employees who need to know about really all possible settings. Not surprisingly, things often go wrong. And while the ideal of 100% security can hardly be achieved, there are opportunities to determine from time to time whether everything is optimally configured. Periodic security analyses, meanwhile, are also necessary to comply with data privacy regulations such as AVG/GDPR. The EU is working on regulations around mandatory cyber security.
Microsoft is present in every IT landscape to a greater or lesser extent and therefore plays a central role in the strategy to optimally secure your IT.
Microsoft and Pink Elephant work closely together to help organisations improve their IT security. A first step in this is Microsoft’s Security Assessment. This is tooling from Microsoft that runs on a temporary server in your IT environment. It examines your entire corporate network and the Microsoft 365 and Azure environment for vulnerabilities and risks.
For example, the Security Assessment looks at whether Windows is securely configured and patched. It also checks administrative permissions and remote users of Microsoft 365, SharePoint, Teams and Azure. The results of the scan also determine the organisation’s current security maturity, on the basis of which concrete improvement actions are proposed.
The Security Assessment has a turnaround time of one month and results in a clear report and a concrete action plan. It is Pink Elephant’s experience that every IT landscape can be improved.
We can offer this Security Assessment free of charge. There are only some costs associated with hosting the temporary server in Azure, but these are limited. The assessment can be carried out once or periodically.
Compliance Assessment
The above Security Assessment can also be performed over the axis of compliance. This variant assesses, for instance, whether confidential documents are only accessible to those who are allowed to do so from their position. Or whether other Dutch and European laws and regulations are complied with.