Blog
Modernisation
Google

How protected is your workspace environment?

November 3, 2020

90% of all reported breaches are caused by carelessness, extortion or external threats. How protected is your workspace environment?

Phishing Attacks: 91% of attacks start with a phishing email. Targeted threats are extremely tough to detect.
Malicious Attachments: 66% of malware was installed via malicious emails & attachments. 4.3x more malware received by corporate inbox than end-user inbox. Attackers rapidly change tactics to defeat email security measures.
Data Breach: 90% of all reported breaches caused by employee negligence, extortion & external threats. Lack of admin controls on user emails makes remediation particularly hard.
Ransomware: 15 x increase in ransomware losses from 2015-2017. Inconsistent back-ups increase the risk of business continuity.

Seisma's Google Workspace Security Assessment

Seisma’s Google Workspace (previously known as G Suite) Security Assessment provides a qualitative analysis of your configuration and processes: supported by Google’s recommended best practices.

The assessment focuses on the following areas:

  • Preventing spoofing, phishing and malware
  • Preventing account compromise
  • Managing privileged access (including 2FA)
  • Preventing data loss
  • Managing 3rd party application access
  • Alerting and incident response

The results provide clear insight into your current security health and identifies key areas for further improvement and recommend next steps. A small engagement with us will get you a detailed security assessment report with implementation recommendations.

Contact us today to find out more.

*This blog is sourced from acquired company Fronde.

Data Sources:

  • Enterprise Phishing Susceptibility and Resiliency Report, Cofense
  • Verizon DBIR 2017
  • Willis Towers Watson 2017 Cyber Risk Survey
  • 2017 Cybercrime Report, Cybersecurity Ventures

Blog

Celebrating 20 Years of Growth and Transformation at Seisma

Blog

Embracing the Future with Microsoft Fabric

Blog

Customer Strategies for the VMware Acquisition

Case Study

An Evolutionary DevOps Journey at BCITO Te Pūkenga