IT Management

Managed Detection and Response

Managed Detection and Response – A New Approach to SMB Security.

Hackers have upgraded their systems.It is time to upgrade yours

POPIA Compliance

With the grace period of POPIA of 1 July 2021 coming closer, business is still unsure of what needs to be done to be compliant. At CX Consulting, we are there to assist you with the process to ensure you are compliant by the deadline.

Cyber Security Consulting

This service is perfect for those with smaller IT budgets or larger corporates that would like to maintain the work that was done as part of a larger vulnerability assessment or penetration test.

Penetration Testing

For organizations of any size, penetration testing is an absolute necessity. Regardless of whether it is driven by regulatory compliance, corporate liability concerns, or basic network hygiene, penetration testing is the foundation of enterprise security. It identifies vulnerabilities, validates existing controls, and, when done right, provides a roadmap for remediation. Monthly, quarterly, or annually, Lomoto can meet the penetration testing demands of any business in any industry.

Cloud Backup

We offer a variety of information security services ranging from security assessments as well as IT Managed Services. We also provide independent security assessments on Wireless Infrastructures, Remote access assessments, internal & external infrastructure assessments and social engineering assessments.

Managed IT Services

Your time is precious. You have more important issues to deal with than your computer network. It is, however, a critical enabler to your business and in need of attention to ensure it’s running predictably, optimally and securely. Our fully managed program is the ideal solution for an organization like yours, an organization that demands the utmost in network reliability and quality service.

Office 365 Services and Integration

From Cloud Solutions to Mobile Device Management. Let Us Help You, Enquire Now!
Scroll to Top

Managed Detection and Response

Who is hiding in your network?

 

Traditional IT security tools like antivirus and firewall focus on prevention – in other words, trying to stop cybercriminals from breaking down your front door.

​And while these still play an important role, hackers are finding new and innovative ways to bypass these systems and infiltrate SMB (Small, Medium Business) networks.

​So what happens when a hacker slips through the cracks undetected? How long will they spend dwelling in your environment? What sensitive information will they capture? And at what point will they deploy ransomware and fully encrypt your systems?

​To protect our clients from these evolving threats, we offer managed detection and response (MDR) solution as part of our security service. The added layer of protection is designed specifically to look for these hidden threats and “quiet” indicators of compromise that other tools miss. Think of it as a safety net or the backup cord on a parachute; if your primary defenses fail, MDR provides active threat hunting that can be the difference between a quick recovery or a major incident. Hackers have upgraded their systems. It is time to upgrade yours!

​How MDR works?

 

​COLLECT:
Our software collects data from your desktops, laptops and servers, and sends it up to a cloud-based engine for automated review. This process is invisible to users.

​ANALYZE:
Once captured, our threat operations team manually reviews suspicious and potentially malicious activity to eliminate false positives and identify real threats to your network.

​REMEDIATE:
If an active threat is present, our team will isolate and remediate any infected machines. We’ll also provide you with easy-to-follow instructions if additional work is required or if we need to coordinate with you directly.

Implementation is seamless and does not require any tedious configuration. Contact us today to find out how easy it is to add this layer of protection to your business.

POPIA Compliance

While ensuring compliance might seem overwhelming, it can in fact be achieved in five easy steps:

  • Appoint or reassess the role of the information officer. In terms of the regulations under POPI, the duties imposed on the information officer have been extended and now include certain mandatory duties. The default information officer of a private body is its head, which is generally the CEO, unless it has been delegated. The first step to compliance would therefore be to appoint an information officer if the organisation does not already have one, or to reassess the role of the existing information officer in line with the requirements set out in POPI

  • Create awareness. In order to ensure effective compliance, buy-in from senior management all the way down the chain of command is needed. Make sure employees understand what data privacy legislation entails and what is required of them. This can be achieved through interactive awareness training.

  • Personal information impact assessment. Once all employees are informed, self-assessments and audits should start throughout the organisation, within each business unit. It is important to understand what information is collected, how it is collected, by whom it is collected, what it is used for, how it is stored and processed, how it is retained and destroyed and whether it was collected with the necessary consent. Once self-audits are completed, there should be a clear understanding of how data is being processed in the organisation, and it will be in a position to identify gaps and produce a clear gap analysis and risk assessment report.

  • Develop a compliance framework, which can include processes and policies. A proper gap analysis will help identify which processes and policies have to be put in place.

  • Implementation. The compliance framework should be implemented, monitored and maintained. Policies and procedures do nothing to aid compliance if they not properly implemented. The last step to compliance would be to ensure the proper implementation of new policies and procedures through in depth training, awareness campaigns, annual re-training and compliance audits.

Still sounding overwhelming? Let us take care of this for you. This service can be handled as an once-off project or month to month and usually includes a few days consulting time monthly on an agreed SLA to ensure continued compliance.

Cyber Security Consulting

Where do you start?

This service is perfect for those with smaller IT budgets or larger corporates that would like to maintain the work that was done as part of a larger vulnerability assessment or penetration test.

​A company can utilise consulting hours or days as required, in terms of our service portfolio offerings. This option is done on a month-to-basis and can include the following services as per clients’ individual needs:
​Information and new products available

  • Informing companies of new security trends
  • Participation in new infrastructure roll-out meetings
  • Serving as advisory board for the company on security concerns and issues
  • Vulnerability assessments or security assessments on demand that would take up consulting hours or days
  • Identify and help mitigate risks on an ongoing basis
  • Regular meetings to discuss progress and concerns

​This service cost ranges from month to month and usually includes a few days consulting time monthly on an agreed SLA.

Penetration Testing

How does it work?
Though penetration testing is a checklist item for any responsible enterprise, not all penetration testing services are created equal. Some are cursory. Others expose your weaknesses, but leave you wondering what to do next.

At Lomoto, we offer a comprehensive penetration testing package that begins with safe and controlled exercises to simulate covert and hostile attacks. And it ends with specific guidance and recommendations for reducing risk and increasing compliance. Lomoto Penetration Testing answers the follow questions:

  • ​What’s working? Penetration Testing validates the effectiveness of existing safeguards.
  • What’s not working? We identify vulnerabilities and risks through manual penetration and automated scanning.
  • What’s at stake? Our penetration testing specialists quantify risk based on the relative value and confidentiality of vulnerable information.
  • What’s the worst-case scenario? We simulate attacks on the network and measure the potential impact to your operations.
  • What’s to be done? Lomoto Penetration Testing Services are not over until we detail the specific steps necessary for complete remediation.

​Why Lomoto?

At Lomoto, penetration testing is just one of many security services we offer our clients. We utilise some of the most sophisticated testing tools in the industry, many of which are used by hackers. Our engineers is highly skilled security professionals and is constantly identifying and analysing new threats, often before they are even known by the world at large. In other words, choosing Lomoto for your penetration testing needs may just be the easiest decision you’ll make today.

Cloud Backup

You can get setup within a blink of an eye. The solution is based upon minimal impact on CPU and memory usage. Cloud backup seamlessly integrates on any platform – from. Windows, Linux, Microsoft Exchange, SQL, MySQL to MAC.Slow internet connection and large amounts of data can be a stumbling block to implement a data disaster recovery plan. We offer a initial seeding service that will assist you in the doing your first backup on a local device and then deliver / ship the data to us. Once the data has been copied, your devices will continue to do incremental backups.

​The secure storage of your data is our priority and that is why the cloud back support AES256 encryption. You set and manage the keys yourself. Once your data leaves your network it is encrypted and securely transferred to the cloud. Real-Time Ransomware Protection is included at no additional fee with all our backup plans. Using intelligent pattern identification, Real-Time protection stops a ransomware attack in it’s tracks.

Managed IT Services

Total IT support and management for a fixed monthly price – it’s that simple. Lomoto will provide all of the benefits of an internal MIS department for a fraction of the price of staffing one yourself. They will reduce the business impact of IT failures by minimizing their occurrence, and any unforeseen issues are dealt with as a top priority. All aspects of your network are covered: security, data protection applications and hardware.

​When you outsource the management of your important IT resources to Lomoto, we look upon that as a partnership. Our comprehensive approach
means we are your IT department. By optimizing your network’s performance, it will work at the peak efficiency and reliability levels that your business demands, allowing you to focus on running your business, not your network. Security, networking, data protection and user support – they handle it all for a single, predictable price.