Egis IT Security LLC

Egis IT Security LLC

Computer and Network Security

Carmel, IN 88 followers

We work with businesses on computer and network security and regulatory compliance needs.

About us

Egis IT Security LLC is a company based out of 10255 Commerce Drive, Ste 250, Carmel, Indiana, United States. • IT security risk management for regulated businesses under HIPAA/HITECH, FFIEC, PCI, FISMA, DFARS and CMMC, NIST Standards, ITAR, and the CJIS standard - among others • Compliance-as-a-Service and Managed Security Services Provider and Consulting • Network, Software Development Life cycle, and Cybersecurity consulting and assessments • Policy, process, and procedure documentation including entire security framework - security policies, business resumption plans, incident response plans, ongoing awareness and training, and other continuous improvement efforts • Functional network, systems/software, and security monitoring services including firewalls, 2-factor authentication, anti-virus, anti-spam / malware, operating system patching, encryption, SIEM products, and user behavior monitoring • Incident mitigation and forensics services • Technical resource for working with auditors, examiners, and regulators We also have tech skills to help with projects if you need us! • Cisco Duo Security MFA • KnowBe4.com Security Awareness and Training • Microsoft Azure and Office 365 GCC and GCC High Sales and Support • Sonicwall Firewalls and their security stack • Barracuda (and other) email security and filtering • MDR (Managed Detection and Response) Consulting • SIEM (Security Incident Event Monitoring) Consulting

Website
https://www.egis-security.com
Industry
Computer and Network Security
Company size
2-10 employees
Headquarters
Carmel, IN
Type
Privately Held
Founded
2015
Specialties
Cybersecurity, HIPAA Compliance, CMMC Compliance, NIST SP800-171, Firewalls, MSSP, GRC, PCI Compliance, Security Awareness Training, Continuous Monitoring, SIEM, SOC2, CJIS, DRAAS, MS 365, MDR, Azure, Cybersecurity Insurance, Vulnerability Monitoring, and Pen Testing

Locations

Employees at Egis IT Security LLC

Updates

  • This is our last post for the 2024 Cybersecurity month! (Bummer, I know right!) Here is a short blog post about password practices to celebrate. Thinking back to email and "Business Email Compromises" / BEC events we have consulted on this past year, poor password hygiene was a root cause or enabler for 3 of those events. In one memorable case, in addition to bilking the victim company out of 10s of thousands of dollars, they also retrieved a spreadsheet of other passwords and started accessing other important outside accounts. Spreadsheet protection passwords can only keep them out of that file for a couple of hours if they have the right tools! Please check out the article on the link below, and have a safe and happy Halloween! https://lnkd.in/gjf35YEx

    • No alternative text description for this image
  • View profile for Jerry Johnson, CISSP, SSCP, ITIL, graphic

    President at Egis IT Security LLC

    Was looking at some dark web monitoring alerts today with one of our analysists and remembered this article from Bitwarden. "Password Spraying" is a mechanized form of credential stuffing attack. The bad guys have all of these stolen credentials from over time that include passwords, and they make a database of them essentially and start trying logins across the board. If you've had a password stolen from a Facebook hack, they'll try that same password against your bank account, corporate vpn logins, email accounts, etc. This usually gets combined with a dictionary attack where they just try all of the most commonly seen passwords that they track from all of the compromises. (Here's looking at you Password$1!) Bitwarden's a decent product to help manage credentials. We sell stuff like that but advise you get it from someone! https://lnkd.in/gFnKpWiD

    How to protect against password spraying attacks | Bitwarden Blog

    How to protect against password spraying attacks | Bitwarden Blog

    bitwarden.com

  • A lot of us are probably getting used to seeing MFA / 2-factor turned on for important accounts already. Banks and investment sites and lots of others are requiring it now, and it's not optional! We've seen and heard grumblings from employees at clients about 2-factor. The reasons for it at your company are basically the same as why your bank needs it - to protect the business and you. As a business owner, your operations and data security should be at least as important as how your bank feels about your info there. As an employee, you should be protecting the company you work for. If you don't want to or it's inconvenient sometimes I'll share a secret with you - you are being RIDICULOUS. In this cyber threat world your owners and managers should be using it and requiring it of everyone. Want to go to 99% security? Use MFA! Want to go higher? Give us a call! https://lnkd.in/eiSv8YFQ

    • No alternative text description for this image
  • It's Cybersecurity Awareness month but we haven't hit the busy season for hacking yet for this time of year! As we get closer to the December holidays, the scammers and phishing emails are sure to pick up or become more clever. They usually switch to holiday-themed messages like package delivery alerts, gift card scams, and fake product sales for the latest Santa toy. That means *now* is the time to contact us so we can help with your defenses, assessments, and security awareness training.  This article also has some good tips to bear in mind and help keep your business safe! https://lnkd.in/gjf35YEx

    • No alternative text description for this image
  • MFA = Multi-factor authentication 2FA = 2-factor authentication Two-Step - I think it's a dance? I don't support dancing, at least not for computers or networking or information security! What most people are doing with MFA is really 2-Factor authentication with a username+password and a "second factor". The 2nd factor can be your face, fingerprint, a code from a text message, or better yet from a secure app like Duo or Microsoft authenticator. Can 2-factor be overcome? Yes - but it's 10x harder than getting past a username and password. So it's like going from 90% secure to 99% secure, or 99% secure to 99.9% secure. A factor of 10. Want to get to 99% or higher security? Use MFA! Want to go higher? Give us a call! https://lnkd.in/eiSv8YFQ

    • No alternative text description for this image
  • View organization page for Egis IT Security LLC, graphic

    88 followers

    When we work with clients on vulnerability management, some things that make the worst security holes are old Windows updates and running stale software like 10 year old Acrobat! I think it's amusing when people are resistant to Windows 11 who won't hesitate to go out and buy a new cell phone on a weekend whim! Change and updates are good for security, and they'll help your brain grow! But jokes aside, updates should be the easy part of security. Contact us and we can help you keep up! Happy Cybersecurity Awareness month! https://lnkd.in/eiSv8YFQ

    • No alternative text description for this image
  • Egis IT Security LLC reposted this

    View organization page for Egis IT Security LLC, graphic

    88 followers

    Criminal Justice Information (CJI) is at the core of law enforcement operations, requiring strict security measures to protect sensitive data. The FBI’s Criminal Justice Information Services (CJIS) Security Policy sets the standard for securing CJI from its origin to storage. Compliance with the CJIS Security Policy is critical for any organization that handles CJI, ensuring data confidentiality, integrity, and security at every step. At Egis IT Security, we assist businesses in navigating these requirements, offering tailored solutions that improve security protocols and ensure adherence to the policy. Let us help safeguard your organization with: 🔹 IT policy improvements 🔹 Vulnerability assessments 🔹 Security awareness training 🔹 Continuous monitoring 🔹 Audit support and more. Stay compliant, stay secure. Reach out to Egis today to learn more about how we can assist your team. #ITSecurity #CJISCompliance #DataProtection #EgisIT #CyberSecurity

    Egis IT Security | CJIS Security Policy / NCJA - Noncriminal Justice Agencies / Processors and Non-Processors

    Egis IT Security | CJIS Security Policy / NCJA - Noncriminal Justice Agencies / Processors and Non-Processors

Similar pages