IT Security Services

We’ll be there when you need us

However carefully you plan, there’ll always be some unexpected IT problem that can impact your business operations. When that happens,
Perigon One’s IT Security Services will get you out of trouble.

Are you vulnerable to cybercrime?

Cybercriminals are actively working against you, 24/7. Cyber threats can take many forms and strike unexpectedly, so that at any moment you might find yourself without the ability to run your business.

HERE’S HOW WE CAN HELP YOUR BUSINESS:

1.

Reduce the risk of cybersecurity threats like ransomware & data breaches

2.

Discover
and fix any vulnerabilities in your current systems

3.

Create a cybersecurity roadmap that will lead you to a secure environment

4.

Train your staff teams to recognise and combat cyber threats

5.

Set up appropriate technology and protocols to protect your business

What our Security Services cover

We keep your technology secure

Our IT Security & Cybersecurity Solutions include:

At Perigon One, we offer a comprehensive range of IT security services designed to protect your business-critical data and IT environment. To begin with, we’ll assess the current state of your system for vulnerabilities to cybersecurity threats.

We can provide you with day-to-day security tools and protocols, and help train your staff teams to understand and recognise cyber attacks. 

We’ll help you cope with disaster recovery, and – better yet – we can help you draw up a recovery plan so that you know what to do in the event of an attack.  

Perigon One has the expertise and experience to give you peace of mind.

Emails are one of the easiest points of entry for cybercriminals.
The Perigon One Cyber Security Report

Our Cyber Security Report meets all requirements that are part of the IDENTIFY in the The National Institute of Standards and Technology (NIST) cybersecurity framework. 

The focus of this Analysis is to perform asset discovery and vulnerability management.

Prevention is better than Cure is an old adage that holds true. It is a proven fact that by following the NIST guidelines you will improve your chances of minimising the impact of cyberattacks, by 99%.

The Security report covers:
Compliance
  • User analysis
  • Computer analysis
  • Active directory policies
  • Password policies
  • User behaviour tracking
  • Integration with Winlogbeat
  • Vulnerability assessments
  • Missing patches and upgrades report
  • Application vulnerabilities
  • Installed software report
  • Non-approved software report
  • Per asset and company risk scores
  • Checks end-user routers for vulnerabilities
  • Checks if routers have easy-to-use passwords
  • Checks if the router passwords are hackable
  • Scores the various access points that users connect to from Windows
Let’s Put the Hackers Out of Business

1. Check how long it would take to crack your password

The longer and more complex your password, the harder it will be for cyber-criminals to crack it through brute force.

What’s that? It’s where automated software tries thousands of variations of passwords, until it finds the right one.

Check your password now. Enter it below and you’ll see how long it would take criminals to crack it. The longer, the better.

Generate Password
Powered by HSIMP

This is powered by How Secure Is My Password. Your password is safe and is not sent across the internet.

If you need a better password, click Generate Password and we’ll create a random one for you. Make sure you use a password manager to remember it.

Hackers are targeting your business!

Find out in seconds if your email address or mobile number has been stolen or compromised. Enter it here. And we’ll run it through a comprehensive database of all data stolen over the last few years.

Make sure to enter your mobile number in international format, such as 447970123456.

This is powered by Have I Been Pwned.

Input an email address below to check if its been compromised.

Search

All businesses are vulnerable to hacking, all the time.

At One Technology we can review your systems to ensure your business and your invaluable data is as secure as possible. You can watch three videos of an ethical hacker demonstrating just how easy it is to gain access to your data here!

At Perigon One, we offer a comprehensive range of IT security services designed to protect your business-critical data and IT environment. To begin with, we’ll assess the current state of your system for vulnerabilities to cybersecurity threats.

We can provide you with day-to-day security tools and protocols, and help train your staff teams to understand and recognise cyber attacks. 

We’ll help you cope with disaster recovery, and – better yet – we can help you draw up a recovery plan so that you know what to do in the event of an attack.  

Perigon One has the expertise and experience to give you peace of mind.

Emails are one of the easiest points of entry for cybercriminals.
The Perigon One Cyber Security Report

Our Cyber Security Report meets all requirements that are part of the IDENTIFY in the The National Institute of Standards and Technology (NIST) cybersecurity framework. 

The focus of this Analysis is to perform asset discovery and vulnerability management.

Prevention is better than Cure is an old adage that holds true. It is a proven fact that by following the NIST guidelines you will improve your chances of minimising the impact of cyberattacks, by 99%.

The Security report covers:
Compliance
  • User analysis
  • Computer analysis
  • Active directory policies
  • Password policies
  • User behaviour tracking
  • Integration with Winlogbeat
  • Vulnerability assessments
  • Missing patches and upgrades report
  • Application vulnerabilities
  • Installed software report
  • Non-approved software report
  • Per asset and company risk scores
  • Checks end-user routers for vulnerabilities
  • Checks if routers have easy-to-use passwords
  • Checks if the router passwords are hackable
  • Scores the various access points that users connect to from Windows
Let’s Put the Hackers Out of Business

1. Check how long it would take to crack your password

The longer and more complex your password, the harder it will be for cyber-criminals to crack it through brute force.

What’s that? It’s where automated software tries thousands of variations of passwords, until it finds the right one.

Check your password now. Enter it below and you’ll see how long it would take criminals to crack it. The longer, the better.

Generate Password
Powered by HSIMP

This is powered by How Secure Is My Password. Your password is safe and is not sent across the internet.

If you need a better password, click Generate Password and we’ll create a random one for you. Make sure you use a password manager to remember it.

Hackers are targeting your business!

Find out in seconds if your email address or mobile number has been stolen or compromised. Enter it here. And we’ll run it through a comprehensive database of all data stolen over the last few years.

Make sure to enter your mobile number in international format, such as 447970123456.

This is powered by Have I Been Pwned.

Input an email address below to check if its been compromised.

Search

All businesses are vulnerable to hacking, all the time.

At One Technology we can review your systems to ensure your business and your invaluable data is as secure as possible. You can watch three videos of an ethical hacker demonstrating just how easy it is to gain access to your data here!

Want to get started with your Security Services!

BOOK A TIME THAT SUITS YOU

Keeping your business
running. Always

IT & Cyber Security

Plan awareness training schedule to keep abreast of the latest threats; investment program for security products.

Cloud & Hybrid Cloud

Set up cloud solutions for your business that are best suited to your present and future projects.

Software Licensing

We take account of your licensing needs when planning any IT project, so you save time and money.

Business Continuity

With expertly planned IT projects, we ensure your Business Continuity and operational resilience.

IT Products

We'll help you choose the right products for your project, supplied by the best vendors at competitive prices. We plan for all aspects of your projects, including security plans, networking, software, hardware and end-user computing.

WAN, VPN & Mobility

Design solutions that will increase your business mobility, so you can work anywhere.

Moving, Sharing & Migrating Data

Design programmes that will increase your business agility.

Servers, Storage & Backup

Use our industry expertise and connections to plan your data storage investments.