BIS Network Security

Comprehensive Layered Network Security Protection

According to the 2015 Cyberthreat Defense Report, over 70% of businesses have reported falling victim to a successful cyberattack in the last 12 months. At BIS we take a comprehensive layered network security approach. Our solution employs multiple vendors security definitions. Our network security solutions will help to prevent security threats from infiltrating your network by scanning for vulnerabilities, filtering website traffic, tracking system changes and alerting if any threats are found.

Experience Our Network Security Solutions For Yourself

Our Network Security Solutions

OpenDNS
BIS SIEM Compliance Management
BIS Firewall Security Management
BIS Vulnerability Scanning

Since 2009, security incidents have grown 66% year over year

CGMA Magazine

Open DNS - Network Security

Domain Name System (DNS) is what make the Internet user friendly. Basically, it’s an address book for websites. When you type www.askbis.com the DNS Servers convert that name to an IP address that goes to a web server. Using the correct DNS Server with the proper filters can be a great way to keep threats from entering into your network.
OpenDNS is a service that we use as a layer of protection that prevents cyberattacks. While a firewall and antivirus react to attacks after they have launched, OpenDNS observes Internet infrastructure before attacks have launched preventing malicious Internet connections. By pointing your DNS traffic to OpenDNS, it will stop 50% to 98% more attacks than antivirus and firewalls.

KEY FEATURES

Malware & Breach
Proactive Threat Intelligence
Comprehensive Web Filtering
Dynamic Reporting
Ability to Secure Any Device Anywhere

BIS SIEM Compliance Management

With new laws being passed every year, it is more important than ever that organizations meet regulations. From HIPAA to SOX, businesses are being audited for compliance on a regular basis. It can be difficult to pass if you don’t have certain measures in place.
With our BIS SIEM Compliance Management, you’ll be able to see who is attempting to access data or make changes. It will detect malicious activity by tracking and validating changes made in applications and the system. With this solution, you’ll be able to pass compliance audits including HIPAA, SOX, FISMA, PCI DSS, ISO 27001 and more.

KEY FEATURES

Compliance Auditing
Active Directory, SQL & Exchange Logging
File Use Monitoring & Windows Server Change Logging

BIS Firewall Security Management

When it comes to your company’s data, you can never have too many protections in place. More and more viruses are being created daily with the objective of gaining access to you and your clients’ confidential information.
With our BIS Firewall Security Management, it will reduce the number of security threats by filtering network traffic. We integrate multiple security features into one solution to create a product that will prevent cyberattacks with web filtering and anti-virus, anti-spam and anti-spyware while managing bandwidth.

KEY FEATURES

Intrusion Prevention & Web Filtering
Bandwidth Management
Multi-ISP Fail Over & Load Balancing
Anti-Virus, Anti-Spam & Anti-Spyware

BIS Vulnerability Scanning

The majority of security breaches could have been avoided if businesses had taken proactive measures. Unfortunately, most organizations don’t discover a potential threat until it’s too late. If they had been actively monitoring their network, they would have been able to find the threat and fix it.
BIS Vulnerability Scanning helps to prevent security attacks from occurring by detecting loopholes in your network. With our security solution, your network will be protected with monthly (unobtrusive) scans that will create a report of findings to show you potential security threats as well as any changes made to your firewall settings.

KEY FEATURES

Report of Findings
Comprehensive List of Network Assets
Vulnerability Detection Including Expired Active Directories & Software Updates & Patching

See What Other Gulf Coast Businesses Are Saying About Us...

Download Resources

Understand the Anatomy of Attacks to Stay One Step Ahead
Firewalls and antivirus stop many attacks during several steps of the “kill chain,” but the velocity and volume of new attack tools and techniques enable some to go undetected for minutes or even months.

BIS Subject Matter Experts on Network Security

Brandon Spivey

Security Operations Manager

Elliott Shirley

Security Operations Engineer

Patrick Rhodes

Backup & Disaster Recovery Engineer

Experience Our Network Security Solutions for Yourself

Request Your Free Demo Today

Read our latest blogs

What is Business Email Compromise?

Continuing on with our Tuesday Tech Tip email security series, we’re going to talk about business email compromise. What is it? How does it happen? And most of all, how do you protect your company from it? Stay tuned.

Business email compromise is really more of an outcome or means by which the bad actors are exploiting email. There are multiple tactics, multiple ways that they get a business email compromise to happen. it can simply be from somehow scanning your password and what we call account takeover and then being able to compromise you. It could be a spearfishing attack where they target specific people, the CEO and the CFO. It could be through other means by which there’s a man in the middle attack. But ultimately, business email compromise is a class that is set for the highest of risk and therefore the highest payoffs for the bad actors. Whenever a business email compromise happens, it’s going to cost you a lot of money or your cyber liability insurance a lot of money, and the bad actors are going to make some money.

Slet’s talk a little bit about what is password takeover. That’s ultimately where somebody and sometimes they can get this just by sending an email saying, hey, your account is almost full All you have to do is click here and you’ll get unlimited space. And all you have to do is put in your email address and your password, and then boom, you got unlimited space. Well, Microsoft 365, you just gave them the keys to the Kingdom, and they can now rape and pilfer your entire Microsoft 365 environment. a lot of people look at that as just their email But there is a whole ecosystem behind the scenes that’s happening in Microsoft 365. So there’s a lot of room for exploits.

I’ll tell you one quick story with a financial planner that we work with to help secure their email. One of the financial planner guys had his account taken over and the bad actors went out and made forms on the Microsoft 365 platforms. it was really like all of the demographics being asked for, the Social Security numbers, the spouses, the phone numbers, the email addresses, the date of birth, you name. It was in this long questionnaire. The bad actors simply sent the questionair email to all of the contacts within the business that they had from the financial planners email account. The financial planners had a shared contact database. These bad actors sent out to all of the people saying, “hey, we’re doing some spring house cleaning. We want to update all of your records. Here’s a link. Please go out and fill out all of this information for us.”

Well, what happened was that goes out to all of their clients and the clients click. They see this form that has their domain name. The financial planner’s domain name on a Microsoft form looks very legit because A: it is legit. But the bad guys took over the account. Many clients filled out a ton of information and hit submit. The bad actors raked all that information. Now, boom, they got a ton more targets to go after and a lot of data to sell for a lot of money.

So business email compromise you really want to have multi factor authentication turned on your email. really on anything nowadays anything that has one too many where there’s one username, one password and you’re logging in, you have access to many records. You need to Enable multi factor authentication is your biggest way. You also really need to be monitoring and watching those 360 accounts because again, that ecosystem is much broader than most people think. If you have questions, I’m here to help. Thank you for watching.

Read More »