Skip to Main Content

It’s always time for Cybersecurity Awareness

If there was ever a more appropriate time for Cybersecurity Awareness Month, we don’t know when it would be.

High-profile cyber attacks have made most of the population aware of the dangers hackers pose. Breaching a company’s cyber defenses gives these keyboard criminals access to a wide range of data, including customer data and employee data.

Those attacks served as a wake-up call for many companies to review their cybersecurity posture.

And, for IT consultants like you, another reminder to safeguard your personal and financial information. Now that we brought up the subject, you may be wondering just how serious we are about keeping your personal data safe.

The short answer is: Very.

Our internal LRS IT Department follows strict policies and procedures to evaluate security implications and enforce best practices for all employees, systems, and applications. Their efforts are focused on following a Zero Trust framework using layered technology elements such as Identity, Data Protection, Threat Protection, Application Security, Endpoint Management, Infrastructure, and network security with auditing and monitoring capabilities throughout.

Identity and Access management systems are critical components to any enterprise security design. LRS utilizes Azure Active Directory combined with on-premise Active Directory as our primary identity provider. These technologies allow LRS to securely authenticate users, devices, applications, and processes before granting authorization to access resources.

LRS employees are required to create strong network passwords, but our IT Department goes beyond passwords to authenticate users. Numerical PINs are alternatives to passwords, and we also rely on multifactor authentication to identify users connecting to our network using a smartphone or other mobile device.

We encourage employees to use data protection technology that enables them to classify files and emails as Personal, Private, Confidential, or Highly Confidential. Classification based on data sensitivity not only ensures that information is not unnecessarily exposed to unauthorized individuals, but also applies an appropriate level of encryption to preserve its confidentiality.

Speaking of encryption, we employ hardware level disk encryption, Virtual Machine encryption, backup encryption, database encryption, and files protected by either passwords or public and private keys.

LRS also has extensive defenses against cyber attacks. We use the threat management capabilities of our security software to detect and investigate suspicious login. We also have anti-virus, vulnerability management, and attack surface reduction capabilities that alert IT security personnel of potential endpoint intrusions.

We have next-generation protection for emerging threats, endpoint detection and response (EDR), and potentially unwanted program (PUP) detection to ensure the integrity of LRS devices and data.

Rest assured that the personal data you send to LRS Consulting Services, including your resume, is kept safe. We are very serious about data security all year long, not just during Cybersecurity Awareness Month.