Case Study: Horn IT Managed Services Provider

You might not yet be familiar with all of the ways that a managed services provider can make your IT run smoothly at a price point that beats in-house and other outsourced options. The following is just a snap shot of the many services we provide to our happy clients.

Cloud Computing: 7 Reasons to Move Your Business To The Cloud

Cloud computing is rapidly becoming the standard for business computing, but if your business has an old-school, hardware based set-up, you may not be sure if moving to the cloud is right for your business data. You likely already used cloud based applications in your personal computing activities, and there is a good chance that at least some of your employees are using cloud applications in their roles (an activity that you should have tight control over). But perhaps you haven't migrated all of your sensitive data to the cloud yet.

Layered Security: Security Assessment

The final step in ensuring that your security strategy is water-tight, is in circling back around to look at the systems you have put in place and reinforce or adapt these systems as your business needs and pertinent threats change over time. Performing a security assessment or audit every year or two ensures that your security measures are never outdated, and that gaps that may have gone unnoticed are addressed.

Layered Security: Security Information and Event Management (SIEM)

In order to properly approach your business' security strategy, you need a complete understanding of the strengths and weaknesses of your defensive and offensive position. Between staff turnover, stakeholder interest and strategic planning, having proper logs of security events is essential to ensuring that your security approach is relevant and strong.

Layered Security: Business Continuity Planning (BCP)

Your business needs a living, working business continuity plan, with disaster recovery built in, to ensure that no matter what comes at you, you're ready to meet the challenge. Putting all of the steps toward total security in place to protect your business data is essential, but once the on-the-ground work has been done, it can be easy to forget that threats change and evolve, and disasters happen even to those of us who are most prepared.

Layered Security: Device Hardening

Device hardening is the process of setting up all of your systems with only the services that are essential to your business functions, and then testing those systems for vulnerability.

Every device that is used by employees for any business data should be hardened - servers, PCs, laptops, and mobile devices, which should also be encrypted.

Layered Security: Anti-Malware and HIPS

Likely the one measure you already have in place, anti-malware and host-based intrusion prevention systems (HIPS) are a critical piece of the security puzzle, which includes policies and standards, employee awareness, network intrusion defense and access control, segmentation and system access control.

Layered Security: System access control

Access control is one of the foundational elements of a security system. Making sure that your network is as secure as possible means making sure that only users who need access to your system, have access, and that that access is restricted to the most limited degree possible.