Office 365 Secure Score
Have you ever wondered how your computer organizes the work that you do? How when you want something, it automatically appears?
Office 365 Secure Score is here to help and has become a key component of the **GTconsult **bag of tricks.
Put simply, the service analyzes your Office 365 organization’s security based on your regular activities and security settings. Following this, it assigns a score.
Que pasa?
You are probably wondering how one gets their score. It is actually really simple.
Anyone who has admin permissions for an Office 365 Business Premium or Enterprise subscription can access the Secure Score at https://securescore.office.com.
Those who do not have admin rights won’t be able to access Secure Score.
Administrators can however use the tool to share their results with other people in their organization.
Is it voodoo magic?
Is this some sort of unexplainable bunch of voodoo magic?
No it is not…and you know it!
Secure Score figures out what Office 365 services are in use and then looks at settings and activities.
These are then compared to a baseline established by Microsoft. You’ll get a score based on how aligned you are with best security practices.
Will it help me?
The simple answer to this question is: of course it will.
Using Secure Score helps increase your organization’s security by encouraging you to use the built-in security features in Office 365. And we all know about the threat the cyber criminals currently pose.
Using Secure Score and working through the tools will give you the peace of mind that criminals will not infiltrate your business and steal vital information.
We are not paragons of everything IT, so dont just rely on us with blind faith.
Users who have been accessing Secure Score have seen their score increase five times more than customers who aren’t using it.
The increase in score corresponds with the security features being used in their organizations. Be like Fort Knox and not Epimetheus who opened Pandora’s Box
Free External Security Assessment
The internet is not exactly a safe place, and there is a constant and ever-present danger looming. Allowing external access to your network is essential to your business but the fear of what may occur may be causing you sleepless nights.
Hackers are on the rise, data breaches and ransomware attacks hit all time highs in 2017.
It has never been more important to protect your network from external threats.
The GTconsult A-Team’s External Security and Vulnerability Assessment will use known hacking techniques to discover your external networks vulnerabilities and public information and provide you with a full audit and step by step guide to resolve issues and mitigate risks.
Network Discovery
- ● External Facing device scan
- ● Subdomain Finder
- ● IP Network Scan and Discovery
- ● DNS Entries
Company Information Discovery
- ● Breached Database list
- ● Rouge/Shadow IT deployments
Employee Discovery
- ● Personal Info – Name, title, email, username, employee number, password etc
- ● Social Info
Vulnerability Assessment
- ● External facing website
- ● External facing servers
- ● Email address gathering
- ● Username Disclosure
- ● Router information
- ● Public information
- ● Unsecure traffic