Servers
Servers
In the event of power outages, our servers are fully protected with a automated power backup supply which provides emergency power for critical systems. This ensures your business is always covered and doesn’t affect work ability.
We also protect your servers 24/7, with cyber security being a huge priority for us as hack attempts continue to increase and become more clever in their attempts. This includes proxy firewalls, antivirus, malware and other protection software. We are alerted instantly if there is an attempted access or hack to the system. Our protection will also instantaneously block that attempt and prevent that particular IP from ever accessing your server again.
Data
File Protection
Cyber security is of the upmost importance in today’s society. ITData takes this seriously by ensuring the following:
- Any data received from the client to our servers becomes encrypted during transit. This means if the data is intercepted by a hacker during transit in any way, it would become useless for use by the time it reaches our server.
- Data is stored on multiple drives and tape media. This ensures that if a drive fails due to age or a technical error, your data is covered by further drives.
Tape backup is also used as a safe backup option for data that isn’t stored online, keeping it safe from hackers.
- We understand that businesses are constantly growing, and sometimes at a rapid pace. This comes with the issue of data amounts increasing quickly and sometimes overloading the server and programs such as Microsoft 365. We ensure we do regular back ups of critical data and archive it. These archives are stored in a fireproof room that is able to withstand temperatures in excess of 900°C.
Services
Services We Provide
- Install of IT equipment for any new office fit outs, both commercial and residential
- Data storage solutions
- Data recovery from failed devices such as laptops, desktops, USB drives and SD cards.
- Computer sales and onsite 24/7 IT
- E-Waste collections
For data recovery, we offer a no charge inspection, so we can give a more accurate cost of getting your data back.
Support
Services We Provide
- Install of IT equipment for any new office fit outs, both commercial and residential
- Data storage solutions
- Data recovery from failed devices such as laptops, desktops, USB drives and SD cards.
- Computer sales and onsite 24/7 IT
- E-Waste collections
For data recovery, we offer a no charge inspection, so we can give a more accurate cost of getting your data back.
Threats
Malware Attacks
Malware is an abbreviation of “malicious software”, which includes viruses, worms, trojans, spyware, and ransomware, and is the most common type of cyberattack. Malware infiltrates a system, usually via a link on an untrusted website or email or an unwanted software download. It deploys on the target system, collects sensitive data, manipulates and blocks access to network components, and may destroy data or shut down the system altogether.
Here are some of the main types of malware attacks:
Viruses—a piece of code injects itself into an application. When the application runs, the malicious code executes.
Worms—malware that exploits software vulnerabilities and backdoors to gain access to an operating system. Once installed in the network, the worm can carry out attacks such as distributed denial of service (DDoS).
Trojans—malicious code or software that poses as an innocent program, hiding in apps, games or email attachments. An unsuspecting user downloads the trojan, allowing it to gain control of their device.
Ransomware—a user or organization is denied access to their own systems or data via encryption. The attacker typically demands a ransom be paid in exchange for a decryption key to restore access, but there is no guarantee that paying the ransom will actually restore full access or functionality.
Cryptojacking—attackers deploy software on a victim’s device, and begin using their computing resources to generate cryptocurrency, without their knowledge. Affected systems can become slow and cryptojacking kits can affect system stability.
Spyware—a malicious actor gains access to an unsuspecting user’s data, including sensitive information such as passwords and payment details. Spyware can affect desktop browsers, mobile phones and desktop applications.
Adware—a user’s browsing activity is tracked to determine behavior patterns and interests, allowing advertisers to send the user targeted advertising. Adware is related to spyware but does not involve installing software on the user’s device and is not necessarily used for malicious purposes, but it can be used without the user’s consent and compromise their privacy.
Fileless malware—no software is installed on the operating system. Native files like WMI and PowerShell are edited to enable malicious functions. This stealthy form of attack is difficult to detect (antivirus can’t identify it), because the compromised files are recognized as legitimate.
Rootkits—software is injected into applications, firmware, operating system kernels or hypervisors, providing remote administrative access to a computer. The attacker can start the operating system within a compromised environment, gain complete control of the computer and deliver additional malware.
Social Engineering Attacks
Social engineering involves tricking users into providing an entry point for malware. The victim provides sensitive information or unwittingly installs malware on their device, because the attacker poses as a legitimate actor.
Here are some of the main types of social engineering attacks:
Baiting—the attacker lures a user into a social engineering trap, usually with a promise of something attractive like a free gift card. The victim provides sensitive information such as credentials to the attacker.
Pretexting—similar to baiting, the attacker pressures the target into giving up information under false pretenses. This typically involves impersonating someone with authority, for example an IRS or police officer, whose position will compel the victim to comply.
Phishing—the attacker sends emails pretending to come from a trusted source. Phishing often involves sending fraudulent emails to as many users as possible, but can also be more targeted. For example, “spear phishing” personalizes the email to target a specific user, while “whaling” takes this a step further by targeting high-value individuals such as CEOs.
Vishing (voice phishing)—the imposter uses the phone to trick the target into disclosing sensitive data or grant access to the target system. Vishing typically targets older individuals but can be employed against anyone.
Smishing (SMS phishing)—the attacker uses text messages as the means of deceiving the victim.
Piggybacking—an authorized user provides physical access to another individual who “piggybacks” off the user’s credentials. For example, an employee may grant access to someone posing as a new employee who misplaced their credential card.
Tailgating—an unauthorized individual follows an authorized user into a location, for example by quickly slipping in through a protected door after the authorized user has opened it. This technique is similar to piggybacking except that the person being tailgated is unaware that they are being used by another individual.