Proper cyber security

In today’s landscape cyber-attacks have become regular news item. Company’s size is irrelevant anymore, whether it is a large enterprise or a small business. 
Cyber-attacks may cause financial loses, paralyze production, or even bring companies to bankruptcy. In fact, that happens on a daily base! 
Companies have legal liabilities to keep their data and client privacy safe; Otherwise, they may suffer damage to their brand and legal consequences.   
Therefore, every company must have proper cyber security setting to prevent cyber-attacks but also, companies must have a recovery plan in case they are breached! 
Prepare for tomorrows cyber-attacks, today!
Magic Stone delivers custom cyber security solutions and services based on the best Israeli cyber defence technology. 
We specialize in delivering unique, uncanny best-of-breed solutions to the marketplace bearing in mind ease of implementation, user adoption and costs. Our solutions are used by large enterprises as well as by the small and medium-sized businesses. 
We work as a network of experts, constantly scanning the marketplace and bringing the best solutions and cyber security know-how experience together to fit our client’s needs

OUR APPROACH

GETTING STARTED

Cyber security frameworks
Cyber security can be divided into several challenge areas, each with it’s own complexity and technology solutions.
PROTECTION   – How to protect the organization against cyber attacks
DETECTION AND RESPONSE    – How to manage the inevitable exposure to cyber attacks
RECOVERY   – How to prepare for and manage recovery from cyber attacks with minimum damage. 
 
By implementing protection measures an organization can limit the risks, and make it more difficult for cyber attackers to break in.
Protection and prevention measures are not a guarantee but just as necessary as a lock on the front door or installing a fire alarm.  
Most organizations already have the basics covered but if in doubt, this is the starting point for checking your level of cyber readiness

PRO-TECTION

KEY PREVENTIVE MEASURES

Network security, e.g. firewalls, network segmentation, VPN and strong authentication
Anti virus, endpoint security and anti malware software, pop-up blockers and a managed Internet browser policy
Security patch management
Employee awareness, Phishing simulation attacks to educate to increase alertness, e.g. how to recognize and handle suspicious email, simplifying end-user response
Vulnarability and compliancy scans
Planned Penetration Testing
Protection and prevention measures are not a guarantee for safety, and cyber attacks become increasingly sophisticated.
An organization therefore must actively monitor, detect and manage attacks and breaches.
The aim is to identify and remove threats as quickly as possible and with minimum damage to the organization.
One of the main challenges is the huge amount of data to monitor, doing this manually (with or without a SIEM solution) is a tedious and very time-consuming activity

DETECTION AND RESPONSE

ADVANCED SOLUTIONS

Advanced solutions using Artificial Intelligence dramatically increase efficiency of the monitoring and help security experts to focus on selected potential threats.   
Advanced solutions can also automate Incident Response, e.g. blocking a suspicious email or suspicious access to a server, hereby minimizing potential demage while security experts investigate the threat.  
Monitoring and Incident Response as a service (SaaS) can be delivered to companies that choose not to have this expertise in-house.
 
It is important to plan for and have the tools to enable recovery of business critical data with minimum loss.   
The required infrastructure and tooling for this purpose are not cyber security specific. 
Magic Stone can support you with sanity scans and advice
 
 
 
 

RE-COVERY

Our Clients

Contact us

Get in touch