IT SECURITY SERVICES 

Keeping your company data, servers and services secure in today's ever changing threat environment has become more important than ever, especially after last year's Data Breach laws.

 

You can read more about them here: 

Security and the New Data Breach Laws

 

 

Penetration Testing and Remediation 

We can perform Penetration testing of your servers and services, provide full reporting to present to any relevant regulatory bodies and remediate your issues to provide Before and After reports for peace of mind.

  

 

AWS

Did you know that if you perform Penetration Testing on your AWS environment without pre-approved permission you can get in serious trouble? We can perform detailed Penetration Testing of your AWS environment with remediation.

 

 

Full Office Security Audits

Concerned about how well your office would score for security? We can help with a Full Security Audit with recommendations.

 

 

IT Policy Creation

Creating effective and security compliant IT policies are complicated and time consuming. We can create tailored policies to provide to your staff, regulatory bodies, third party suppliers and customers to ensure you are covered.

Examples of policies include:

  • Information Security Policy
  • Vulnerability and Remediation Policy
  • Password Policy
  • Network Access Policy
  • IT Data Disposal Policy
  • Access Control Policy
  • Data Classification Policy

 

 

Secure Microsoft 365 or G-Suite

Most important security options for Microsoft 365 or G-Suite are not enabled by default. It is essential to enhance the default security posture of Microsoft 365 / G-Suite to prevent unnecessary attacks by Malware or theft of your data. Exxa will harden your setup to ensure maximum security and minimum inconvenience. Setup of Mobile Device Management settings to ensure if your mobile device is lost or stolen you can safely remotely remove company data.*

*Microsoft 365 Business accounts (formerly Office 365) and above only

 

 

Data Classification and Data Loss Protection

Leverage software to classify and protect sensitive data from leaving your company.

DLP Software can prevent forwarding, copying and other extraction techniques for your most sensitive data to provide you with peace of mind.