3 min read

New security measure - ThreatLocker

New security measure - ThreatLocker

As cybersecurity threats evolve, business security defences must too. This is why we have added ThreatLocker to our core security pack. ALL Superfast clients will now benefit from this added layer of security and we encourage you to watch the video below to understand what this means to your business.

ThreatLocker enables us to enforce a 'Zero-Trust Security Framework'. This type of cybersecurity is typically used by governments and large corporates. Most importantly, ThreatLocker will provide an added layer of protection, combating against the rising number of small and medium-sized businesses falling victim to ransomware, data theft and extortion cyberattacks.

Why ThreatLocker and a zero-trust security framework?

Watch the video to learn more about why we have added ThreatLocker and what it means to your business. Please note, there is a new process to install new software that is not pre-approved. Watch the video to find out the details.


How Superfast IT keep ahead of cybersecurity advancements

We actively monitor new threats to lower your risk of becoming a cybercrime victim. Superfast IT is part of a national partnership with leading IT firms and a member of the West Midlands Cyber Resilience Centre. Together we share security intelligence and best practice. We attend major cybersecurity events and also participate in The Department for Digital, Culture, Media & Sport cybersecurity 'calls for action' - which is shaping cybersecurity policy and how the UK regulates supply chain cybersecurity in the future.


Video transcript:

Hello, I'm James Cash, and I'm here to tell you about some security developments that affect your business. We're increasing the security built-in to our core services to better protect your business from the growing cybersecurity threat.

Increase in cyberattacks hitting SMEs

Through our industry partnerships and our relationships with other IT firms around the country, we see a significant increase in the number of cyberattacks hitting businesses like yours. Our partners report that businesses are being affected by crippling ransomware attacks, data theft followed by extortion, and often both together.

Ransomware attacks work by blocking your access to your systems and data, then demanding a ransom to release the encryption keys needed to undo the damage.

With data theft, followed by extortion, the attackers don't even need to encrypt your data. They extract a copy of your data, then use this information to extort money from you, threatening to release the data to your customers and your competitors if you don't comply with their ransom demands.


Cyberattack example

Only this week, one of our partners in London has let us know of an attack against one of their clients. Their client has seen all of their systems made inaccessible by the attacker who is demanding a ransom.

The attacker has destroyed the system back-ups as part of the attack and stolen a copy of the victim's data. The attacker is threatening to release the information to customers and competitors of the victim. You can imagine the damage to their organisation if the attacker carries out their threat. It will be painful and costly for the victim organisation to recover from this situation - if they indeed can recover.


Introducing ThreatLocker

The best approach is to prevent situations like this from occurring, and that is why we have added an extra layer of defence to our core service. This extra security control is called ThreatLocker, and it brings a level of defence regularly adopted by governments and other large enterprises.

Zero-Trust security framework

ThreatLocker operates on a 'Zero-Trust Security Framework', which means that only pre-authorised software is allowed to run on your systems. After deploying the tool and learning about your environment, we secure your systems, and any new software then requires approval.

ThreatLocker will run on all your computers and servers and blocks any unapproved software, including ransomware, viruses, and other malicious code.

ThreatLocker will run on all your computers and servers and blocks any unapproved software, including ransomware, viruses, and other malicious code.

Zero Trust Secuity - ThreatLocker

Running applications that are not approved

Should you run any applications that are not pre-approved, you will receive a notification prompting you to request permission or ignore it if you don't need it for your day-to-day business functions.

Any request automatically creates a ticket with our support team. We will then review this, ensure the application is not malicious, and approve it, if appropriate.

Untrustworthy software or applications that could provide a gateway to cybercriminals and cause a cyberattack will be rejected.

How to request new application and software - ThreatLocker

Need new software? Let us know in advance!
With ThreatLocker securing your systems, it is essential to let us know in advance if you need any new software installed. You can do this by contacting our IT support team in the usual way.

New software install - let us know in advance


If you have any questions or want to speak with us about your cybersecurity, get in touch, and we'll be happy to assist you.

Schedule call

Cybersecurity packages

What is a firewall and why your business needs one

2 min read

What is a firewall and why your business needs one

We are often asked: What is a firewall and what does it do? Why do I need it for my business? Firewalls are an essential part of any business network...

Read More
Interview with CYBER EXPERT James Cash: Manufacturing & cybersecurity

14 min read

Interview with CYBER EXPERT James Cash: Manufacturing & cybersecurity

Superfast IT Founder and Managing Director, James Cash, was recently interviewed by Matt Bradfor-Auger from Finally as part of the 'Engine Room'...

Read More
Cyber Security Poster

3 min read

Cyber Security Poster

Downloadable cyber security awareness poster Download a free cyber security poster for your office. Educate and remind your team about cyber security...

Read More