Cyber Security

NATO HAS OFFICIALLY ELEVATED THE "CYBERSPACE"
TO THE "DOMAIN OF OPERATIONS" RANGE

WE HELP COMPANIES AND PEOPLE IN THE DEFENSE OF DIGITAL BOUNDARIES, WE DESIGN VIRTUAL PERIMETERS

AWARENESS
U2F
VPN
BACKUP

Cyber
Security

Syrus Industry specializes in Cybersecurity and is recognized at institutional level to be able to identify and implement all the fundamental activities for information security.

Nowadays, in a world that is always interconnected, network security should be the priority not only of governments and institutions but of all aware citizens. Every day, around 40,000,000 cyber attacks are launched worldwide and in 93% of cases, hackers take less than a minute to compromise the system. 80% of victims do not realize that they have been hit for weeks or even months. Furthermore, in 7% of cases, the violation is not detected for more than a year, especially when we talk about Wifi Hacker and Social Engineering. The most frequent attacks that occur in cyberspace are multiple and dangerous. We are also thinking of the cryptocurrency sector (Bitocoin for example) which, although protected by the use of the blockchain, deserves special attention.

The main threats

Spyware Adware Phishing Trojan Ransomware Rootkit

These dangers cause the company to lose data, opportunities and money.
This is why Syrus Industry, in addition to offering online security systems, makes also entrepreneurs and employees aware of the risks if a real and verified protection system is not implemented.

One of our main products for putting our navigation into protection is VPN, a Vpn (Private Virtual Network) able to provide a secure channel through which all types of data travel, which, once transmitted, are encrypted and made inaccessible to hacker attacks. VPN is a guaranteed and highly technological product able to create a secure perimeter around your network (personal or corporate).

In addition to this product, Syrus, in the creation of its software adopts a implementation strategy called Software Development LifeCycle, a development procedure that ensures security and organizes the constituent activities of a software life.

5 Useful Advice
Cyber Security

CREATE A SAFE PASSWORD

It will seem trivial, but the first, fundamental form of security of your Internet workspace is precisely the choice of a Secure password. But how to choose a Secure password? Here are some simple and effective "tricks":

  • Use a unique (and different) password for each important account: Always reusing the same passwords is risky. If someone guesses your password for an account, it could potentially get access to your private emails, your address and even your bank account.
  • Use a combination of letters, numbers, and symbols: For example, an eight-character password containing numbers, symbols, and uppercase and lowercase letters is more difficult to find because it has 30,000 possible combinations than an eight-character password containing only lowercase letters.
  • Do not use personal information or Simple sequences such as "password" or "access", series of keys or easy sequences such as "abcd1234". Try a random word or phrase and enter letters and numbers at the beginning, center and end to make it particularly difficult to guess (eg "sPo0kyh @ ll0w3En").
  • Make sure you regularly update the recovery email address so you can receive emails in case you need to reset your password

MOST IMPORTANTLY: Keep your passwords safe. Don't leave notes with your passwords on your computer or desk. If you decide to save your passwords in a file on your computer, give the file a special name that does not allow others to recognize the content. Avoid giving the file a discounted name, such as "my passwords"

Cyber Security

TWO STEPS

ADD TWO-STEP VERIFICATION

Authentication or two-step verification is a function offered by a large number of online services (Google, Apple, HomeBanking etc.) and adds an additional level of security to the login process to your account, requiring the user to indicate 2 forms of authentication.

The first is authentication is generally represented by the password. The second is possible to choose different modes; perhaps the most popular is the SMS or email code.
We recommend using a U2F security token The two-step verification means to access the work space you need to know something and have something. But how does it work? When you set the verification in two steps, you are asked to Indicate a Trust device, ie a device that can receive a verification code using SMS or other Dialogue technologies between devices.

ACTIVITY

CHECK THE RECENT ACTIVITIES OF YOUR ACCOUNT

A quick way to check for suspicious access to your account is to check your recent account activity. Try performing a Penetration Test or using a Keylogger technology

On an account like Google, the latest account activity shows information on the most recent activities in your mail.

Recent activities that you can monitor are indicated whenever you have accessed your mail from a browser, a POP client, a mobile device, a third-party application, etc. The IP address that accessed the mail, the associated location, and date and time are listed.

If you have access to a Google Account or Google Apps account, you can view this information by clicking the Details link next to the Last account activity line at the bottom of any Gmail page or by going to the link security.google.com.

FAQ

FAQ: FAQ: WHAT DO THESE DATA MEAN?

  • Access Mode: indicates the type of Access and Device that have accessed your Account. This information is essential to find out if and when someone has had access to your mail. For example, if the column shows POP access, but you do not use the POP function to retrieve mail, it is possible that your account has been compromised.
  • Location (IP address): the last 10 IP addresses that have accessed your mail and the associated geographic locations are listed. If you see an IP address and a geographical area that is not familiar to you, it is possible that your account has been compromised.

ALWAYS USE SECURE NETWORKS

You should always be very careful every time you access the internet using a network that you don't know or trust - for example the Wi-Fi connection in the bar or the neighbor. You never know what kind of access that network has to the personal information on your device.

FAQ: But how can I recognize an unsecured network?

It is not easy to recognize an unsecured network, but there are some indications that allow you to have a safer and more responsible navigation:

  • First look at the address bar in the browser to see if the URL looks real. You should also check if the web address starts with https: // - which indicates that the connection to the site is encrypted and, therefore, more resistant to snooping or Sniffing.
  • When connecting via a public Wi-Fi, anyone in the vicinity has the potential to monitor the information that passes between the computer and the hotspot, if the connection is not encrypted. It is better to avoid performing activities that can expose sensitive data such as banking or payment: then access to Home Banking or online purchases.
  • Always protect your home network with the password. By protecting your home network, you can avoid additional costs, prevent any attacker from being able to access your router to change settings and spy on your online activity.

LOCK THE
SCREEN

LOCK YOUR DEVICE SCREEN

You would never leave the house all day with the door open, right? The same principle also applies to your devices. You should always lock the screen when you're done using your computer, tablet or smartphone. To have more security, you should set the device to lock automatically before sleeping. This is especially important for phones or tablets to protect our information. For more information go to our Cyber ​​Security Course or read our Cyber ​​Security book

Contact
Syrus Industry

Via del Fontanile Anagnino 173
00118, Roma (RM)

info@syrusindustry.com

www.syrusindustry.com

vai a contatti