IT SECURITY SERVICES
Keeping your company data, servers and services secure in today's ever changing threat environment has become more important than ever, especially after last year's Data Breach laws.
You can read more about them here:
Penetration Testing and Remediation
We can perform Penetration testing of your servers and services, provide full reporting to present to any relevant regulatory bodies and remediate your issues to provide Before and After reports for peace of mind.
Did you know that if you perform Penetration Testing on your AWS environment without pre-approved permission you can get in serious trouble? We can perform detailed Penetration Testing of your AWS environment with remediation.
Full Office Security Audits
Concerned about how well your office would score for security? We can help with a Full Security Audit with recommendations.
IT Policy Creation
Creating effective and security compliant IT policies are complicated and time consuming. We can create tailored policies to provide to your staff, regulatory bodies, third party suppliers and customers to ensure you are covered.
Examples of policies include:
- Information Security Policy
- Vulnerability and Remediation Policy
- Password Policy
- Network Access Policy
- IT Data Disposal Policy
- Access Control Policy
- Data Classification Policy
Secure Microsoft 365 or G-Suite
Most important security options for Microsoft 365 or G-Suite are not enabled by default. It is essential to enhance the default security posture of Microsoft 365 / G-Suite to prevent unnecessary attacks by Malware or theft of your data. Exxa will harden your setup to ensure maximum security and minimum inconvenience. Setup of Mobile Device Management settings to ensure if your mobile device is lost or stolen you can safely remotely remove company data.*
*Microsoft 365 Business accounts (formerly Office 365) and above only
Data Classification and Data Loss Protection
Leverage software to classify and protect sensitive data from leaving your company.
DLP Software can prevent forwarding, copying and other extraction techniques for your most sensitive data to provide you with peace of mind.