IT Security


IT Security

The evolving threat landscape and increased compliance regulations are putting organisations under pressure to address IT Security at every level. Breaches, regardless of the severity, can be disruptive, costly and damaging to a business’ reputation. supportIT can provide organisations with a suite of IT security products and proven methodologies for maintaining the confidentiality of sensitive information and preventing vulnerabilities, without being too restrictive for the business.

Security Audit's

Using ISO27001:9015 best practice and GDPR guidelines, supportIT can conduct a review of all internal policies, processes and infrastructure that relate to IT security. A full recommendations report is part of the service, which includes vulnerability testing.

End-Point Management

Powered by Datto technology, our endpoint management services allow for updates and patch management to ensure maximum protection against security infiltration.

On-Site/Off-Site Disaster Recovery Solutions

Local and Cloud replication means that in the event of a security breech your entire business infrastructure can be available in a matter of hours. Powered by Ekco (formerly Datastring) Disaster Recovery as a Service, supportIT’s disaster recovery solutions give our clients the quickest Return-To-Operations (RTO), competitive pricing and the best ongoing support and monitoring in this area.

Webroot Anti-Virus

The next generation of malware defenders, Webroot uses threat intelligence to learn behavioural patterns and detect unauthorized actions. It’s a first ever cloud-based device protector that can stop known and unknown threats in real time and it continuously analyses the behaviour of over 4 billion machines world-wide. In the unlikely event of threat infiltration, it has a rollback feature which makes it possible to roll back the system to the time before the malware was activated. ‘Webroot’ is very light on your system, doesn’t slow down other processes and can run alongside other antivirus products if required.


Laptops can easily get lost or stolen. This means that sensitive customer data could potentially fall into the wrong hands. Encryption is a tool that once enabled on laptops scrambles the contents of a computer’s hard drive, making the files unreadable by unauthorized users. A key is then used during the encryption process, and the correct key is required to decrypt the contents again and make it readable. Encryption has been named by GDPR as an appropriate way to achieve data protection goals. supportIT recommends ESET Deslock, a fully managed encryption solution.

Two-Factor Authentication

supportIT recommends Microsoft Two-Factor Authentication (2FA) across the board for our clients using Office365. 2FA works by adding an extra layer of security on top of the password, so users have two steps to complete before they can log in on a new device a they enter their password in first, they are then required to acknowledge a phone call, text message, or an app notification on their smartphone before they can successfully sign in. It is particularly useful if users are accessing Office365 over a number of devices and strengthens your security around BYOD (Bring Your Own Device) Policies.

Data Loss Protection (DLP)

Stricter GDPR guidelines and compliance around data protection pose a significant challenge and inhibit organisations from completely embracing cloud services. Controlling how data is used, stored, accessed and distributed is the only way to 100% guarantee compliance in this area, a near impossible task for any organisation. In the last 24 months however, advances in Data loss Prevention (DLP) tools now allow companies to protect sensitive information from falling into the wrong hands, by monitoring occurrences that can lead to information leakages by using a defined set of rules and policies.

Contact us today for a free requirements session