3 min read

New security measure - ThreatLocker

New security measure - ThreatLocker

As cybersecurity threats evolve, business security defences must too. This is why we have added ThreatLocker to our core security pack. ALL Superfast clients will now benefit from this added layer of security and we encourage you to watch the video below to understand what this means to your business.

ThreatLocker enables us to enforce a 'Zero-Trust Security Framework'. This type of cybersecurity is typically used by governments and large corporates. Most importantly, ThreatLocker will provide an added layer of protection, combating against the rising number of small and medium-sized businesses falling victim to ransomware, data theft and extortion cyberattacks.

Why ThreatLocker and a zero-trust security framework?

Watch the video to learn more about why we have added ThreatLocker and what it means to your business. Please note, there is a new process to install new software that is not pre-approved. Watch the video to find out the details.

 

How Superfast IT keep ahead of cybersecurity advancements

We actively monitor new threats to lower your risk of becoming a cybercrime victim. Superfast IT is part of a national partnership with leading IT firms and a member of the West Midlands Cyber Resilience Centre. Together we share security intelligence and best practice. We attend major cybersecurity events and also participate in The Department for Digital, Culture, Media & Sport cybersecurity 'calls for action' - which is shaping cybersecurity policy and how the UK regulates supply chain cybersecurity in the future.

 

Video transcript:

Hello, I'm James Cash, and I'm here to tell you about some security developments that affect your business. We're increasing the security built-in to our core services to better protect your business from the growing cybersecurity threat.

Increase in cyberattacks hitting SMEs

Through our industry partnerships and our relationships with other IT firms around the country, we see a significant increase in the number of cyberattacks hitting businesses like yours. Our partners report that businesses are being affected by crippling ransomware attacks, data theft followed by extortion, and often both together.

Ransomware attacks work by blocking your access to your systems and data, then demanding a ransom to release the encryption keys needed to undo the damage.

With data theft, followed by extortion, the attackers don't even need to encrypt your data. They extract a copy of your data, then use this information to extort money from you, threatening to release the data to your customers and your competitors if you don't comply with their ransom demands.

 

Cyberattack example

Only this week, one of our partners in London has let us know of an attack against one of their clients. Their client has seen all of their systems made inaccessible by the attacker who is demanding a ransom.

The attacker has destroyed the system back-ups as part of the attack and stolen a copy of the victim's data. The attacker is threatening to release the information to customers and competitors of the victim. You can imagine the damage to their organisation if the attacker carries out their threat. It will be painful and costly for the victim organisation to recover from this situation - if they indeed can recover.

 

Introducing ThreatLocker

The best approach is to prevent situations like this from occurring, and that is why we have added an extra layer of defence to our core service. This extra security control is called ThreatLocker, and it brings a level of defence regularly adopted by governments and other large enterprises.

Zero-Trust security framework

ThreatLocker operates on a 'Zero-Trust Security Framework', which means that only pre-authorised software is allowed to run on your systems. After deploying the tool and learning about your environment, we secure your systems, and any new software then requires approval.

ThreatLocker will run on all your computers and servers and blocks any unapproved software, including ransomware, viruses, and other malicious code.

ThreatLocker will run on all your computers and servers and blocks any unapproved software, including ransomware, viruses, and other malicious code.

Zero Trust Secuity - ThreatLocker



Running applications that are not approved

Should you run any applications that are not pre-approved, you will receive a notification prompting you to request permission or ignore it if you don't need it for your day-to-day business functions.

Any request automatically creates a ticket with our support team. We will then review this, ensure the application is not malicious, and approve it, if appropriate.

Untrustworthy software or applications that could provide a gateway to cybercriminals and cause a cyberattack will be rejected.

How to request new application and software - ThreatLocker


Need new software? Let us know in advance!
With ThreatLocker securing your systems, it is essential to let us know in advance if you need any new software installed. You can do this by contacting our IT support team in the usual way.

New software install - let us know in advance

 

If you have any questions or want to speak with us about your cybersecurity, get in touch, and we'll be happy to assist you.

Schedule call

Cybersecurity packages

What is a firewall and why your business needs one

What is a firewall and why your business needs one

We are often asked: What is a firewall and what does it do? Why do I need it for my business? Firewalls are an essential part of any business network...

Read More
A Guide to Improving Wi-Fi Router Security:

A Guide to Improving Wi-Fi Router Security:

Essential Steps for Enhanced Protection In an age where wireless connectivity is central to personal and business operations, securing Wi-Fi networks...

Read More
What happens in a cyber-attack? Cyber-criminals negotiations

What happens in a cyber-attack? Cyber-criminals negotiations

Last week, details of FatFaces’ cyber-attack surfaced. Some incredible details were reported from the attack, including screen shots of negotiations...

Read More