OUR CYBERSECURITY SERVICES

Protecting your clients’ data, systems, and processes from online threats is essential for business sustainability. You need an IT partner who is up to speed with the latest cyber-attacks and knows how to repel them. This way, you can ensure client confidentiality, information security, and uninterrupted services.

Smile IT provides sophisticated monitoring, warning, and reporting, allowing for early detection, proactive resistance, and overall protection mechanisms. Smile IT offers end-to-end cybersecurity services, including network assessments to identify vulnerabilities, email security, mobile security, backup systems, disaster recovery, and much more.

Cybersecurity Services

Managed backups and storage of servers, virtual machines and Microsoft Office 365.

Includes:

  • Continuous monitoring of server and Microsoft Office 365 backups (Mailboxes, SharePoint, Teams, OneDrive)
  • Backup alerts
  • Troubleshooting of backup failures on request
  • Backup reporting – device protection status, alerts summary, and backup activities.

Does not include third-party backups or testing of backup restores.

Only applies when using Backup Platforms recommended by Smile IT.

Ability to block unwanted devices such as USB memory sticks being connected to your company computer.

Email security solution that provides protection against spam, targeted phishing attacks, malware, spoofing, ransomware, impersonation attacks, business email compromise (BEC) attacks, zero-day threats and ATO.

Includes:

  • Continuous email scanning and analysis.
  • Spam filtering.
  • Phishing alerts.
  • Secure email gateway (SEG).
  • Content and attachment filtering for inbound emails.
  • URL and link scanning prior to reaching the user inbox.
  • Sandboxing
  • Reporting
  • Real-time threat intelligence.

Managed email security solution includes deployment, configuration and updates

Protection and management of mobile fleet through Intune policies. Ability to secure company data on company and non-company mobile devices alike.

Includes:

  • Policies for security lockout
  • Tracking and connectivity restrictions
  • Wi-Fi configurations
  • Blocking of built-in apps
  • Device settings and iCloud configurations
  • Application whitelisting for tech services and coal mine workers.

Management of Smile IT provided password management tool. Allows users to safely track, store, protect, share, and manage login credentials for applications and online services in an encrypted vault. With advanced threat detection capabilities that scan the dark web for any unauthorised use of credentials in a data breach.

Key features include:

  • Secure password sharing
  • Multi-factor authentication
  • Strong password generator
  • Autofill through extension
  • Password strength report
  • Digital legacy

Working with the client to ensure all your team members are aware of the company’s cyber security policies.

Protect client’s laptop computers from malicious websites when they are out of office.

A fully managed security solution to provide protection for computer and servers. A complete anti-virus service which includes deployment, configuration, updates, and ongoing maintenance of the anti-virus solution.

Management of AirLock and application control policies defined in Intune.

Controls which applications are allowed to run in your environment through a whitelist.

Applications allowed on Jellinbah’s phones includes

  • Safari
  • Files
  • Camera
  • Measure
  • Magnifier
  • Maps
  • Clocks
  • ChemAlert
  • MEX Mobile
  • Roam 5
  • iVolve
  • Photos
  • Microsoft 365 (Outlook, OneDrive, OneNote, Word, Excel, PowerPoint)

All other applications are blocked.

Detect persistent hacking breaches improving the chance of detecting a breach should one occur.

Encrypt computer’s hard disk drive preventing unauthorised access to stored data when stolen or lost.

Enhance your organisation’s cyber resilience with the security awareness training platform provided by Smile IT. It offers training materials, resources, and best practices, along with simulated phishing attacks to assess and improve employee responses to real threats.

Enforce multi-factor authentication across all Microsoft 365 services for all users. This is one of the most effective controls an organisation can implement to prevent an adversary from gaining access to a device on the network and accessing sensitive information.

Users are required to verify their identity using two or more authentication factors, such as passwords, phone calls, text messages, or mobile app notifications, when signing in to Microsoft 365 services.

A project service is available to enforce MFA for business-critical web applications including Adobe, Xero, and other applications that store sensitive information.

A comprehensive risk assessment of your environment, outlining recommendations and areas to address in regard to cyber security risks.

Includes risk identification and assessment. Risks are assessed based on likelihood and business impact, using qualitative and quantitative methods. The likelihood and impact associated with inherent and residual risks are determined individually.

Smile IT will work with you to create IT security policies that align with your organisation.

Common security policies include cyber security policies, physical security policies, information security policies, data retention policies and others.