SERVICES

Business Safety and Security

ECKOO provides your organisation with a multi-layered approach to security. We understand that the confidentiality and protection of your customer’s information is paramount to your success, so we start our security implementation by analysing your needs and customising our service appropriately.

We can provide you with a complete Layered Security Solution that includes protection of your critical data, as well as preventing potential hack or theft attempts. Our security services use enterprise-class protection and detection to ensure the ongoing safety of your network against the ever-evolving security threats of today’s marketplace.

BENEFITS

We will keep a continual eye on your complete network 24/7/365 and be alerted to any potential issues or breach attempts allowing us to react quickly to eliminate threats.

Data backup is only sufficient to a level, aligning protection levels from the inception of data being saved, to backing up data, encrypting all files and proper transit to offsite locations for redundancy will provide you peace of mind in the security of your critical business files.

Have confidence that your systems are continually being protected! We will provide you with monthly reports and quarterly Risk and security review meetings that will demonstrate the effectiveness of our service.

LAYERED APPROACH

  • 24/7/365 Security Monitoring of core assets and access points
  • Quarterly security assessments provided
  • Establishes a minimum-security baseline
  • All Protect services plus…
  • Daily management of patches, perimeter level mail and AV
  • Advanced security and protection monitoring
  • Threat/Status Reporting and more
  • All Protect and Detect services plus…
  • Additional layers of access protection for employees
  • Full data backup and encryption of data to secure and compliant offsite locations
  • Alignment to regulatory requirements
  • Monthly security risk assessment reviews and more
  • All Protect, Detect & Analyse service plus…
  • Employee workflow controls
  • Advanced Network security management
  • Security operations center support and overwatch and many more services
  • Quarterly Security plan testing
  • Change management and control procedures
  • And more…

PREVENTING CYBER ATTACK

Backup Data

Backup data frequently with the backups stored off the insured’s premises and not connected to the insured’s network.

Staff Training

Ensure all staff have frequent cybersecurity training so they are aware of the potential risks.

Firewall & Anti- Virus Protection

Use commercially licensed managed firewall or anti-virus protection software.

Never pay Ransom

Its not always wise to pay a ransom as you are not able to determine where the money will go (i.e funding terrorism without knowing) or if the hacker will repeat this attack.

Mobile Device Encryption

Protect your data with encryption including mobile phones, laptops and other portable devices.

Credit Card Storing

Do not store your credit card details on websites – do not keep them saved on notes or documents on your computer system.

Password Protection

Keep passwords strong and secured and set up two factor authorisation (2FA).

Third Party Vendor Management

Any requests to alter supplier and customer details including bank account details, independently verified with a known contact for authenticity.

Two Person sign-off

Ensure that at least two members of staff authorise any transfer of funds, signing of cheques and the issuance of instructions for the disbursement of assets, funds or investments.

Incident Response Plan

Have a well-planned approach to addressing and managing a cyber-attack to help respond to and recover from a network security incident.

Business Safety and Security

ECKOO provides your organisation with a multi-layered approach to security. We understand that the confidentiality and protection of your customer’s information is paramount to your success, so we start our security implementation by analysing your needs and customising our service appropriately.

We can provide you with a complete Layered Security Solution that includes protection of your critical data, as well as preventing potential hack or theft attempts. Our security services use enterprise-class protection and detection to ensure the ongoing safety of your network against the ever-evolving security threats of today’s marketplace.

BENEFITS

We will keep a continual eye on your complete network 24/7/365 and be alerted to any potential issues or breach attempts allowing us to react quickly to eliminate threats.

Data backup is only sufficient to a level, aligning protection levels from the inception of data being saved, to backing up data, encrypting all files and proper transit to offsite locations for redundancy will provide you peace of mind in the security of your critical business files.

Have confidence that your systems are continually being protected! We will provide you with monthly reports and quarterly Risk and security review meetings that will demonstrate the effectiveness of our service.

LAYERED APPROACH

  • 24/7/365 Security Monitoring of core assets and access points
  • Quarterly security assessments provided
  • Establishes a minimum-security baseline
  • All Protect services plus…
  • Daily management of patches, perimeter level mail and AV
  • Advanced security and protection monitoring
  • Threat/Status Reporting and more
  • All Protect and Detect services plus…
  • Additional layers of access protection for employees
  • Full data backup and encryption of data to secure and compliant offsite locations
  • Alignment to regulatory requirements
  • Monthly security risk assessment reviews and more
  • All Protect, Detect & Analyse service plus…
  • Employee workflow controls
  • Advanced Network security management
  • Security operations center support and overwatch and many more services
  • Quarterly Security plan testing
  • Change management and control procedures
  • And more…

PREVENTING CYBER ATTACK

Backup Data

Backup data frequently with the backups stored off the insured’s premises and not connected to the insured’s network.

Staff Training

Ensure all staff have frequent cybersecurity training so they are aware of the potential risks.

Firewall & Anti- Virus Protection

Use commercially licensed managed firewall or anti-virus protection software.

Never pay Ransom

Its not always wise to pay a ransom as you are not able to determine where the money will go (i.e funding terrorism without knowing) or if the hacker will repeat this attack.

Mobile Device Encryption

Protect your data with encryption including mobile phones, laptops and other portable devices.

Credit Card Storing

Do not store your credit card details on websites – do not keep them saved on notes or documents on your computer system.

Password Protection

Keep passwords strong and secured and set up two factor authorisation (2FA).

Third Party Vendor Management

Any requests to alter supplier and customer details including bank account details, independently verified with a known contact for authenticity.

Two Person sign-off

Ensure that at least two members of staff authorise any transfer of funds, signing of cheques and the issuance of instructions for the disbursement of assets, funds or investments.

Incident Response Plan

Have a well-planned approach to addressing and managing a cyber-attack to help respond to and recover from a network security incident.

Coming soon

Coming soon

Coming soon

Contact Us

Address

Josipa Štadlera 6, 71 000 Sarajevo, Bosnia and Herzegovina

Contact Us

Address

Level 14 St Kilda Rd Towers · 1 Queens Road · VIC 3004 · Australia

Contact Us

Address

Head Office: Level 27 Santos Place · 32 Turbot St · Brisbane · QLD 4000 · Australia
Showroom: Unit 6 148 Tennyson Memorial Avenue · Tennyson · QLD 4105 · Australia