Qubic Group plc
C1 The Courtyard
Alban Park
Hatfield Road
St Albans AL4 0LA
Tel: +44 20 3300 0000

Qubic Cyber Security Essentials

A multi-layered approach to protecting your information and systems

Qubic Cyber Security Essentials

Qubic’s approach to Cyber Security is to securely make applications and data available to all authorised people, on any device, at any location and at all times while preventing access to unauthorised people and those with malicious intent.

Qubic delivers a holistic approach to Cyber Security with a range of measures designed to offer multi-layered defence that has a light-touch impact on authorised users allowing your staff to conduct business the way they want. All our activities are underpinned by our ISO 27001:2013 and Cyber Essentials accreditations.

Qubic Group plc has a Certificate of Assurance, Certificate Number IASME-A-03866, for complying with the requirements of the Cyber Essentials Scheme.

Identifying the vulnerabilities – Qubic Interrogate & Report

Qubic Interrogate & Report lays the foundations of your Cyber Security defences. We introduce our Network Agents to your entire IT infrastructure; some run externally, others are centrally managed, some are introduced locally and others run from an appliance connected to your network.

Each Agent has a specialised profile to collect data relating to your network, devices and end-users designed to support specialist IT disciplines or compliance areas.

With the Network Agents introduced, they can now begin to collect the raw data that we turn into management information through our reporting module. Detailed reports are generated covering every aspect of your IT infrastructure. These reports identify vulnerabilities, categorise them based on priority and suggested courses of action.

Running a single report can be useful to give you a baseline to work from or may be required as a compliance document for your industry regulator or as evidence for your insurance company. However, we recommend that you regularly collect the data and produce reports to proactively monitor your IT infrastructure.

Keeping it secure anywhere – Microsoft Enterprise Mobility Suite

Are your employees walking, talking potential data breaches? We no longer have deskbound employees that leave all their data and access to that data in the office when they go home at night. The modern productive worker is mobile and flexible using multiple devices including laptops, tablets and phones to access and store potentially sensitive information. The challenge is to allow them to continue to work while keeping them secure; the answer is Microsoft Enterprise Mobility Suite (EMS) from Qubic.

Mobile technology can bring to your business faster customer service, anywhere productivity, improved collaboration and more. Security is always a concern; the truth is, human beings are typically the weakest link when it comes to data security. Even if you have the right policies in place, even the most capable people make mistakes. They CC the wrong person on a confidential document. They leave their phones in taxis, restaurants and airports. They don’t enable proper security. It happens – and it could happen to you.

So what can you do? Disallowing mobile devices altogether would put you way behind your competitors. And heavy-handed security policies can prevent users from getting useful work done.

A better approach is to manage mobile device and mobile data security with a light-touch using modern technology. With the right solution, you can reduce the risk of human error and give your people the freedom to work more securely. Here are three big mistakes humans often make with mobile tech – and how you can prevent them.

Lost devices

No matter how careful people are, today’s ultra-portable devices are also ultra-losable. And with connectivity to your sensitive data, that can be bad news. In some industries, simply misplacing a smartphone or laptop with critical information on it is enough to trigger fines and penalties – even if the information is not actually compromised.

Using our managed mobile productivity, you can easily wipe a device remotely to eliminate the possibility that an unauthorised person can access it. With Microsoft EMS, you can even select which information is personal and which is for business. When someone leaves the company, you can delete your financial spreadsheets and leave their selfies intact.

Data leaks

In today’s digital world, it’s easier than ever to share information. For the most part, that’s a good thing, whether it’s getting a proposal to a client or working together on a business document. However, sharing with the wrong person is just as easy.

That’s why you need employee data security and protection that lives with the data itself. With EMS, you get Azure Information Protection, so you can protect documents no matter where they go. If your employee accidentally copies their cousin Jo Davies instead of their manager Joe Davies, only the authorised recipient can open the attachment.

Weak security

With so many apps, services and devices in people’s lives today, the temptation to sidestep security policies to save a few minutes is more powerful than ever. As a business, you can’t afford to take that risk. If you’re going to let people bring their own devices to work, you need a way to make sure configurations comply with your standards – and stay that way.

EMS makes this simple by providing mobile device management (MDM) and mobile application management (MAM) in one solution. Once devices are enrolled, you can configure, monitor and control hardware, software and policies to ensure mobile data security meets your standards. You can choose which apps are allowed (or not), and be confident that everything is up-to-date with the latest data security measures.

Get more done, more securely

People are your biggest asset – but when it comes to mobile workforce security, they can also be your biggest liability. With EMS, you get a complete, easy-to-manage solution that lets you take full advantage of the mobile revolution while giving you peace of mind that your business is protected.

Putting up the barriers – Qubic’s Shield Wall

There are many ways for those with malicious intent to attack your network. Qubic helps build your defences through its multi-layered Shield Wall.

The first layer of defence is education; making your staff aware of the dangers or inserting untrusted removable media, clicking on attachments from unknown sources or visiting untrusted websites.

Gatekeeper email software

The next layer, is designed to stop any malicious code getting through to your network via email. All email is checked against known threats and any email that contains a known threat is blocked before it gets to your network. This screens out malware, ad-ware, Trojans, viruses and worms. Any email that looks suspicious and could potentially be a phishing email or present another threat can be flagged and held in quarantine to be manually checked.

Signature based antivirus

If any malicious code does get into an endpoint on you network, our traditional, signature-based anti-virus software will detect and quarantine any know threats. This software relies on the threat having been identified elsewhere and added to the virus definitions database as well as on your system being up to date with the latest virus definitions.

There is still a risk if a virus is brand new and has not been encountered before or, a virus has been changed sufficiently to look different to the signature that is logged in the virus definitions database that it can get through.

Anomalous activity lock down

Our final layer is based on detecting the actions of the malicious code and locking down the infected endpoint to isolate and contain the infection. The software monitors the processes within the endpoint and detects an anomalous activity. For example, if you were to click on a Word Document that is an attachment to an email, the system would expect the Microsoft Word programme to open but, if suddenly the attachment started accessing your system files, this would be perceived as a threat and trigger a lockdown.

Recovering from an attack – Qubic’s Resurrection technology

If your network has suffered an attack, the challenge is to recover as quickly and fully as possible.

Any infected or compromised machines need to be cleaned and reconfigured before being put back onto the network. This can be fairly straightforward with single machines as long as you have an uncorrupted back-up: a system-wide infection can present a more significant problem.

Qubic’s Resurrection Server is attached to your network and takes incremental backups of your entire system including operating system and data. This means that you have complete backups of your entire system created at regular intervals. If you have a complete system failure or if your network is compromised by, for example, a Ransomware attack, we can rewind your system to the most recent, uncorrupted copy.

In the event of a hardware failure, the Resurrection Server can become a live server to run your system, while the hardware is being replaced or repaired.

'