https://store-images.s-microsoft.com/image/apps.16662.3951fbb1-da39-44c5-84de-719b1d55a716.51f004da-f521-43ea-99a4-bfb54fafdda8.6c457bab-3733-4e8b-98a1-0fae926a4ed5
C1 CyberSecurity - Monitor, Detect & Advise
Calibre One
C1 CyberSecurity - Monitor, Detect & Advise
Calibre One
C1 CyberSecurity - Monitor, Detect & Advise
Calibre One
Providing 24/7 monitoring and detection across all Microsoft 365 services and network devices.
The Calibre One Monitor, Detect & Advise Program Consists of the following Key Elements:
Step 1: Onboarding and Shaping Up
Step 2: Monitor, Detect & Advise
Step 3: Ongoing Reviews, Audits and Risk Assessments
Office 365 is a very secure platform with many tools to assist with securing and monitoring the environment and while the Out of the box default setup is good, to be truly secure it needs to be configured and optimised for your needs. This is not a function of normal ICT maintenance and most IT maintenance companies will lack the expertise to configure many of the variables, the tools necessary to monitor the conditions and the manpower to act on such alerts in a timely manner. This is the role of our security specialist team.
Our onboarding and Shaping Up process is designed to bring your Office365 tenancy to a higher level of security. To do this we use the built in Microsoft Office 365 Scorecard System to generate an overall security score for your tenancy. This will provide a score reflecting the points from a maximum possible – for example 74% (pretty good) or 11% (really bad). Our onboarding process is designed to bring your Tenancy to a MINIMUM 75% of the potential score for your specific environment – in the above example the 74% would be acceptable while the lower figure is not. This figure is an evolving score and changes over time as Microsoft introduce new features and threats change. (Future Monitoring of this score and adaptation of the environment is one of the variables our security services monitors).
Using Microsoft Azure AD P1 or P2 licensing and Rocket Cyber as our SOC suite of tools, this provides essential monitoring and alerting – warning us to suspicious or malicious activities within your environment. Some are designed to detect ongoing and persistent external threats; others are designed to mitigate and react in the event your tenancy is compromised. This provides essential coverage and then speedy reaction should anything happen.
How Do We Monitor And Detect? An effective program of monitoring and detection is essential to provide basic levels of security. We monitor and detect customer accounts and devices for a number of different threats and attacks, this can include:
- Suspicious Logins
- Impossible Travel
- Activity From Infrequent Country
- Brute Force Attacks
- Suspicious Email Volume Detected
- User Restricted From Sending Email
- Creation Of Forwarding Rules
- Creation Of Suspicious Email Rules
Learn more
C1 Cybersecurity Brochurehttps://store-images.s-microsoft.com/image/apps.43961.3951fbb1-da39-44c5-84de-719b1d55a716.51f004da-f521-43ea-99a4-bfb54fafdda8.1e3ab2dd-35d8-43b3-a86c-3cf084a1371d
https://store-images.s-microsoft.com/image/apps.43961.3951fbb1-da39-44c5-84de-719b1d55a716.51f004da-f521-43ea-99a4-bfb54fafdda8.1e3ab2dd-35d8-43b3-a86c-3cf084a1371d
https://store-images.s-microsoft.com/image/apps.13124.3951fbb1-da39-44c5-84de-719b1d55a716.51f004da-f521-43ea-99a4-bfb54fafdda8.514d29e2-9022-4fa7-a8b0-2ecf2f3dc951
https://store-images.s-microsoft.com/image/apps.28808.3951fbb1-da39-44c5-84de-719b1d55a716.51f004da-f521-43ea-99a4-bfb54fafdda8.500ab1e0-590a-407d-ad4b-2f5aee661317
https://store-images.s-microsoft.com/image/apps.26482.3951fbb1-da39-44c5-84de-719b1d55a716.51f004da-f521-43ea-99a4-bfb54fafdda8.e213a058-9153-48ed-893f-f0ec30e4e84b