The level of control and constraints you have over users’ applications.
Refers explicitly to updating third-party applications. It focuses on applying security updates and patches as quickly as feasible.
This refers to the amount of freedom your users have to run macros in Microsoft Office applications.
Refers to the limitations in place on users’ applications. For example, ads should not be processed from web browsers and users should not be able to change these settings.
Place limits on access to systems and applications, meaning only privileged users will have Admin rights.
To ensure that OS patches, updates, and security mitigations for internet-facing services are applied within two weeks of release – or within 48 hours if an exploit exists.
This section involves enforcing MFA for all privileged access. Maturity starts by enforcing MFA for all users before they access internet-facing services and third-party providers.
Ensure critical systems and information is securely backed up and readily available.
We work with your organisation to understand and define your current and future information security needs.
Our services range from cyber posture audit, risk assessments and security strategy development through to training and educational resources to ensure security controls, strategy and policies are optimised.
We help you to detect and prevent threats, reduce vulnerabilities while maintaining visibility and control over your environment.
Nexon’s security services are fully modular and scalable. Our solutions are tailored to your specific needs as we provide you with the tools to forewarn and forearm.