Data & IT Security

With high-profile security breaches constantly making headlines, people are acutely aware today of the very real threat of a cyber-attack and the increased need to ensure both IT and Data security for their business and customers.

Therefore, it is critical that all businesses today take the necessary steps to best protect them, their business and their staff from these attacks. We offer a broad range of solutions to help our customers best protect against, prepare for and respond to potential cyber-attacks.

Data Security

Data Security begins with backups but you must also consider restore tests to ensure the backups are working.  Archiving is also an important element to ensure you are removing old data in a timely fashion and in accordance with your retention policies.  Purging old data has become more important with the introduction of GDPR. Our Professional Services team can advise on this process.

Data is key to business continuity. It begins with planning to ensure all key systems can be restored in the event of a disaster. Business Continuity Planning  (BCP) is about putting in place systems to ensure disaster recovery. A key element is regular testing to demonstrate and improve your organisations’ ability to recover.

For some organisations, data security may extend to the implementation of a training or sandbox environment of their key systems to ensure no risks are taken with production data.

IT Security

The most fundamental aspect of IT security is endpoint protection. i.e. protecting the PCs and laptops which staff use to do their work. This begins with Anti Virus software and ensuring that the latest operating system patches have been applied.

It can be enhanced further by making sure administrator access is restricted. Restricting an end user from installing unauthorized software is also a significant protection against external threats.

SPAM filtering and Web filtering are other ways to protect your users from accessing or being exposed to potentially harmful attachments, links or websites.

All of these security measures are generally set out in an organisations’ Security Policies. There are some excellent technical solutions which can assist in terms of implementing the security policy.

  • EMS – Enterprise Mobility Management
  • Intune – Mobile Device and app management
  • Azure AD Premium – Identity and Access management for working with Office 365
  • Auditing of access to files

For some organisations there is a requirement to demonstrate their data and IT Security. Cyber Essentials is a globally recognised cyber security certification that offers a sound foundation of basic IT security controls. Intuity are both ISO and Cyber Essentials certified and are approved providers of Cyber Essentials. We can help you gain your own Cyber Essentials Certification.


Our Approach

We work with many clients on multi- platform solutions with very specific criteria, unique to their individual businesses. Therefore, the effect that downtime has on them and their businesses differs from case to case. Our team pride themselves on our bespoke approach to each and every customer.

We offer a broad range of solutions to help our customers best protect against, prepare for and respond to potential cyber-attacks.

We would be happy to discuss your business requirement and help you find the solution to cater to your needs today! Email with your query.

Our Advice

To begin we offer the following simple advice:

1. Look After Your Backups

We advise that you always have 2 back-ups in place; an onsite and offsite backup. This means that you can then retrieve your files should you be affected by a virus on your PC.

2. Invest In Reputable Security Software

Intuity have a number of world class partners who specialise in dedicated security software delivering the best results to date.  We strongly recommend a business level antivirus to offer you the maximum protection and security features.

3. Be Cautious With Emails And Attachments

Don’t open attachments from unknown sources or from emails that appear to be from a legitimate source but are suspicious. Even if the sender’s name looks genuine, check the actual email address before clicking on anything. You must never open an attachment that you are not 100% sure you were expecting it and want to receive. Click here for our advice on ransomware!

Share This