We recommend a multi-layered threat protection approach to safeguard data, including;

  • Network Intrusion Detection
  • Network Administrator Action
  • Customer IP Theft Prevention

What We Do

A honey-pot is commonly described as a decoy computer system that serves as a target for hackers. This ‘honey-pot’ uses the network breach to access information about cybercriminals and the way they are operating or distracting them from other targets while immediately alerting or informing both the customer and us about the breach.

Description

In 2016, we started making use of a honey-pot security system, named the Canary. According to IBM, on average, companies take about 197 days to identify and 69 days to contain a breach (2020) and 92% of hacked organisations only become aware of the breach when a third party notifies them (DBIR, 2012). The Canary gives network administrators an early warning alert when hackers break into their networks. When hackers encounter a Canary, the services on offer are designed to solicit further investigation. At this point, it “chirps”, notifying network administrator of the incident.

preloader image