• Who we are
  • Managed IT
    • IT Management Service
    • Project & Design Services
    • Hardware / Software Equipment Solutions
    • Infrastructure Management
    • Managed Services
    • Domain Management & Web Hosting
  • Cyber Security Centre
    • Security Operations Centre (SOC) Services
    • Cyber Assessments
    • Industry Specific
    • Cyber Security Training
    • Cyber Blog
  • News
  • Careers with us
  • Contact us
  • Who we are
  • Managed IT
    • IT Management Service
    • Project & Design Services
    • Hardware / Software Equipment Solutions
    • Infrastructure Management
    • Managed Services
    • Domain Management & Web Hosting
  • Cyber Security Centre
    • Security Operations Centre (SOC) Services
    • Cyber Assessments
    • Industry Specific
    • Cyber Security Training
    • Cyber Blog
  • News
  • Careers with us
  • Contact us

Cyber Security Training

Why is training important?

One of the biggest causes of cyber security incidents is human error. We can provide training for your network administrators, staff and stakeholders to help ensure that the risks are minimised.

Bespoke cyber awareness training can be created and distributed to your organisation via the platform Kahoot! to increase engagement and learning.

Riela Cyber has also partnered with CybSafe to provide GCHQ accredited cyber awareness training.

 

CybSafe

CybSafe is an intelligent, GCHQ accredited, cloud-based cyber security training platform which removes your dependence on tick-box cyber security awareness. This is accomplished with innovative training and phishing simulations by focusing on the Awareness, Behaviour and Culture of the people in your organisation.

It’s a data-driven human cyber risk management platform exclusively focused on making your people an asset to your cyber resilience strategy. CybSafe provides security teams and decision makers the tools they need to manage and reduce their cyber risk more effectively.

CybSafe product offering also includes:

  • Targeted Behaviour Change geared towards users, administrators and decision makers, runs automatically and continuously and is measured and reported on
  • Hyper-personalised, Accredited Training & Education to either complement or replace your existing training, focusing on the security skills that will help keep your people and your organisation safe
  • Personalised Behaviour Nudges focused on nine core risk areas to actively engage users in best practice cyber security behaviour, removing your dependence on e-learning and tick-box awareness training
  • Virtual Cyber Assistance enabling users to get advice on what immediate action they should take if they are involved in a cyber related incident or have a cyber security concern, at home and in the workplace
  • Sentiment Analysis powered by intelligent cognitive computing to identify what people think and feel about security and give additional focus to your security activities
    Intelligent Social Engineering Simulations across multiple vectors to help you see why someone engaged with a phishing email, USB attack and more so you can address the root cause of the
    behaviour
  • Security Culture Assessments providing recommendations to leaders and decision makers on how to foster a people-centric security strategy and predict future cyber behaviour
  • Risk Insights & Reporting providing deep understanding of all aspects of what people know, how they behave, how confident they are, and what they think & feel when it comes to cyber security

You can find details of the learning modules here.

Included with the CybSafe cyber security training platform is a tool designed to reduce the threat posed by phishing. Not only does the CybSafe platform allow you to setup phishing simulations, it uses the ‘influencing elements’ of an email, as defined by psychology and behavioural science research, genuine insight can be determined why users react to certain tupes of phising email in the way that they do. This is a fundamentally different approach to that taken by any other phishing simulation tool as it provides meaningful cyber risk data which can ultimitaley help to reduce the risk posed by phishing attacks. Find out more about the Intelligent Phishing here.

 

For questions, a quote or a demo please contact Matthew Roberts, Head of Group Sales, via matthew@riela-group.com or +44 7425 314 973.

Network Operations Centre

Our Network Operations Centre provides transparency across your network and systems. Quickly uncovering pinch-points, degradation of connectivity and performance issues. Our strict but streamlined ISO change control procedures facilitate rapid deployment of network changes: 

Infrastructure Monitoring

Our best of breed infrastructure monitoring tools will track the performance of your systems and will automatically raise alarms when performance metrics fall outside predetermined thresholds. For example free/available disk space; if free space falls below set amounts, systems will become unresponsive, and an email server will stop processing email when a disk starts to run out of space – causing you disruption and limiting your productivity.

Perimeter Anti-Malware Protection:

Our Cisco Adaptive Security Appliances solution features an industry-recognised platform called Firepower, which has a host of leading features including anti-malware protection. The firewall will monitor traffic passing through it and check the file signatures against known identities. When a positive match is found, it will block the file before it enters your network.

Real-Time Alerting:

The service desk within our Network Operations Centre provides proactive and reactive incident response services. The reactive service will send an alert to the customer for triage. With the proactive service, our service desk staff will resolve the notifications directly. Under our monitoring, events arrive in a ticket system and a real-time notification is delivered to our SOC engineers (or 3rd party resolvers if required).

Managed Infrastructure Backups:

We will deploy a tool using the remote probe which will regularly collect backups, performance stats and asset discovery. This tool allows our SOC engineers to analyse any changes that have been made, and also to recover device configurations with confidence when a device fails.

Enhanced Backup Services:

Our fully managed and centralised back up solution is ideal for remote sites. The solution allows us to centrally store and manage both system and information back-ups in our secure data centre, and encryption options include the ability to allow the client to be the only key holder. A fully scalable solution, the cost is determined by the volume of data being backed up.

Capacity Management:

An often-overlooked element of effective cyber security is the basic practice of capacity management. This includes, but is not limited to, activities such as reviewing the average Internet bandwidth usage (which, if ignored can yield video conference call quality issues, for example). Other examples include reviewing the trend of the utilisation of system resources to forecast when systems will become constrained. Charges are dependent on the size of the estate to be monitored and are accrued based on time spent reviewing the relevant information on a monthly basis.

Multi-Factor Authentication:

Riela Cyber Security can implement multi-factor authentication systems, which are designed to further improve access control to sensitive systems.

 

Security Operations Centre

Our cyber security operations centre is staffed by fully qualified cyber engineers providing our clients with holistic defenses in depth and breadth. We provide a wide range of services, including:

Security Information Event Management (SIEM):

Whereas infrastructure monitoring will detect the symptoms of something going wrong, SIEM provides insight as to why it is going wrong. Using the industry recognised Splunk solution, we can collect log data from your network and server infrastructure and analyse it to identify potential security incidents.
Our fully trained and officially certified engineers will analyse the data delivered by the Splunk platform and take the appropriate course of action in line with our agreed service agreement with you.

Network Traffic Behaviour Analytics:

Our Network Traffic Behaviour service will enable our qualified security analysts to identify any unusual behaviour on your network. Using the industry recognised Splunk solution, we can identify which computers on your network are talking to the internet, and who they are talking to. Watching for any changes to normal traffic patterns will allow us to alert you and take action against the undesirable activity.
This can be particularly effective because, under normal circumstances, firewalls will typically allow this type of traffic to continue thereby allowing the breach to continue unchecked.

Intrusion Prevention System (IPS):

By deploying Cisco Adaptive Security Appliances (ASA) we can check the traffic that reaches your network against a global database of known suspicious IP addresses or traffic signatures. If identified, our support engineers can be alerted or the traffic can be automatically blocked. This service is typically bundled with Cisco Anti-Malware protection.

Technical Vulnerability Management:

New vulnerabilities can often be identified by equipment manufacturers or more commonly due to configuration changes. By performing regular vulnerability scans of your systems we will continue to identify new vulnerabilities as and when they appear. If discovered, our support staff will take immediate action to mitigate the vulnerability.

Offensive Threat Intelligence:

We will actively investigate security incidents to determine if an attack is targeted or prospecting. For example, if a phishing scam is detected, one of our engineers will actively research the originating party.

Advanced Email Analysis:

This service is designed to evaluate the usual behaviour of email traffic per user. Should this behaviour change, a security incident will be raised for further investigation by our support staff. It is designed to highlight where there has been a clear change in behaviour, for example, a user who typically sends 100 emails a day with a few word attachments suddenly starts sending 200 e-mails a day with excel attachments. This could be a sign of a compromised account or even potentially a disgruntled employee.

Security Operations Centre (SOC) Service Desk:

The service desk is arguably the most important element of any cyber security defence solution. Computer systems are great for analysing information and raising alerts. However, it is the cyber security engineer who enables the translation of the automated notifications into an understanding of what is happening, whether the alert is a false positive, an indication of something suspicious which requires further investigation, or that a system is about to fail (for example an email server). Our fully trained and accredited staff have the experience to manage the incoming alerts and where necessary take the appropriate actions.

Cyber Risk Mitigation

Riela Cyber risk mitigation can provide numerous cyber services to build your risk mitigation strategy. Specialising in:

IT Consultancy:

A good cyber security posture requires a solid foundation in the technology that is utilised. We have expertise in the deployment of enterprise-grade solutions. This includes designing and deploying on-site equipment that facilitates proper remote monitoring and management.

Network Hardening:

It is important to ensure that security best practices are implemented to reduce the risk and vulnerabilities that vendor hardware can expose. Security is often overlooked due to financial or time constraints, especially in cases where a supplier has been pressured to compete on price – don’t wait until your network is compromised before you address it.

Server Hardening:

Riela will ensure that your servers are configured in line with best-practice standards to reduce vulnerabilities. This can range from basic practices such as enabling software firewalls (obvious, but frequently overlooked!) to implement complex policies to ensure would-be attackers struggle to compromise the server. Our fully qualified staff will work with you to optimise your server security.

Engineering:

Implementing your technology infrastructure requires skilled engineers to carry out the work. Our expertly skilled teamwork to top-level quality engineering standards, and these are imposed from day one. From simple but often ignored areas such as dressing cable ties properly to ensuring that electrical standards are fully complied with, all of the work we do for you is completed to the highest quality.

Network Deployment:

Cisco is recognised in the industry as the leading network infrastructure vendor. Utilising their range of world-class products, our fully trained engineers will ensure that your deployment will be completed to the highest security standards and quality.

Server/Workstation Support:

Our skilled and Microsoft trained engineers will ensure that your staff have the right tools to do their jobs. All of our deployments follow strict documented processes and procedures to ensure consistency with any work we undertake for you.

Penetration Testing:

Penetration testing describes a formal engagement for a person to attempt to compromise a system using the person’s own expertise and tools in a controlled fashion; typically, with a constraint of not disrupting services. We use fully vetted 3rd parties to perform this task when required as we believe it is important for an external party to provide independent verification.

Cyber Risk Management

Riela Cyber risk management services provide you with techniques to use to eliminate the risk of cyber attacks. By discovering where you carry cyber vulnerability and weaknesses, Riela Cyber can work with you to achieve ultimate protection.

Asset Discovery:

It is important to have visibility and control of your business assets. These assets may be physical (e.g. a server), information based (e.g. customer contract or bank details) or individuals. We can help provide an accurate and detailed inventory of your assets wherever they are located.

Vulnerability discovery:

All assets can have vulnerabilities. Being unaware of these can lead to a false sense of security. We have invested in specialist vulnerability scanning tools, residing in a private data centre. As a result, our experienced staff can help to identify the potential vulnerabilities an asset exposes.

Threat Discovery:

Using our specialist skills we can help identify potential security threats to your business and its assets to aid cyber risk management. These threats can come in various forms, from hackers to less malicious adverse environmental conditions, such as thunderstorms.

Domain Management & Web Hosting

We can provide you with a range of domain management and web hosting services, including: 

Domain Name Registration and Management:

As an official domain name registrar and a Nominet Partner, we will manage the task of keeping your corporate domains stable and secure, and we are able to fully support the related websites, mail, and infrastructure.

DNS (Domain Name System) Management:

We run our own public DNS servers and have expertise in managing both public and internal DNS for our clients. We offer a complete DNS management service, which can save you time and limit the risk of 3rd party mistakes when migrating e-mail addresses or websites.

Web Hosting – Linux and Windows:

We can provide and support Linux or Windows web servers, with both shared or dedicated available.

Premium Web Hosting:

Our premium offering requires all websites to gain A+ rating on a variety of vulnerability scanners. Our managed service includes; Auditable steps to secure your website, an experienced team to assist in closing vulnerabilities, rigid change control and change alerts, early detection and notification of potential breaches to your website and ongoing vulnerability management.

Hardware / Software Equipment Solutions

Working with you, our team of experts will help evaluate your specific hardware / software equipment requirements. Allowing us to give you impartial advice on the best solutions for your needs. Our vendor relationships allow us to be competitive with pricing. Additionally, we can provide finance options to spread the cost of your IT investment to convert your capital cost into a fixed monthly service fee.

To speak with one of our engineers, please contact us here. 

Infrastructure Management

Riela Tech provides a number of infrastructure management tools, including:

Hosted Remote Desktop Service:

Our hosted remote desktop solution allows authorised users to access your company applications remotely. Users can then utilise resources on that host system as if they were sitting in front of it. Remote desktop access can be customised for multiple device types and specific roles or tasks. Remote desktop solutions can help your business address the challenge of users’ desire for “anytime, anywhere, any device” access and maximise user productivity.

The software on the server manages the connections to corporate IT resources and to remote users, and we support the highest levels of encryption to keep connections secure. With 100% of work streams performed on RDS the business is encompassed by the enhanced security and resilience of the hosted environment.

Private Servers:

Privately hosted servers, with bespoke managed networking, provide our customers with security, location resilience, hardware and server resilience and easy disaster recovery. It removes costly capital expenditure associated with on-site replacements at your premises, and means and end to time consuming maintenance regimes. Full back-up included for every server.

Private Hosted Infrastructure:

Our private hosted infrastructure management provides you with your own private hosted environment on dedicated, managed hardware, with all the benefits of having the hardware on your own premises, but with the resilience, safety, security and scalability that hosting in our datacentre offers.

Hybrid Infrastructure:

Connecting all or some of your internal infrastructure with our secure data centre can provide a cost effective and easy way to ensure location resilience, disaster recovery and negate the need for onsite backups.

High Availability / Distributed Infrastructure:

Run your servers across multiple data centres for maximum resilience. This protects against the loss of an individual data centre, localised internet outages and bandwidth peaks.

Managed Services

At Riela Tech we provide a diverse range of managed services to assist you with your working efficiency and security, whether this be in the home or at the office. We maximise performance and create a hassle-free experience for business owners, their visitors and staff.

Hosted Remote Desktop Service:

Our hosted remote desktop solution allows authorised users to access your company applications remotely. Users can then utilise resources on that host system as if they were sitting in front of it. Remote desktop access can be customised for multiple device types and specific roles or tasks. Remote desktop solutions can help your business address the challenge of users’ desire for “anytime, anywhere, any device” access and maximise user productivity.

The software on the server manages the connections to corporate IT resources and to remote users, and we support the highest levels of encryption to keep connections secure. With 100% of workstreams performed on RDS the business is encompassed by the enhanced security and resilience of the hosted environment.

Hosted Exchange mailboxes:

Our expert team will migrate you from your current provider, with personalised support at each step of the process. Riela’s full range of services includes; shared mailboxes, distribution groups, security groups, unlimited secondary addresses and domain names, drastically reduced spam and malicious email, storage quota management, granular access permissions on corporate mailboxes, shared calendars and contacts, and much more. Taken with our endpoint management, our solution boasts 6 layers of malware checks from 5 different vendors before the malicious email can reach your inbox and infect your operating system.

File Synchronisation (syncSafe):

Synchronise your file structure across multiple devices and locations with our syncSafe system, and share files with 3rd parties via a password protected and time-limited links. Hosted in our datacentre, your files are double encrypted at source and encrypted in transit.

File Synchronisation – fully managed security:

For further peace of mind, Riela can roll-out syncSafe to every endpoint and ensure each one complies to a minimum security standard:

  • Using Microsoft’s BitLocker feature, sensitive data can be kept encrypted and private even when a laptop is lost or stolen.
  • Our endpoint security and management suite ensures the data is as safe both whilst in transit and at rest on the workstation.
  • For complete data security, we configure the connection from workstation to the syncSafe servers ourselves, so your syncSafe user accounts can never be connected to an unmanaged machine. This gives you 100% control of every location holding your files.

Private Backup as a Service:

Back up your remote environments with unique encryption keys specific to you, held in Escrow if required. So secure even we cannot read your backed up data!
Security:
Using the industry recognised ESET security suite we can automatically monitor files, applications and traffic across your network and infrastructure.
Integration into our central endpoint monitoring systems generates alerts and notification tickets to our CRM. This can be deployed by Group policy, with the automatic install for new devices which saves you time when taking on a new employee.

Microsoft Software:

We are Microsoft Partners and Service Providers.
We provide all Microsoft licensing, applications, and operating systems on a monthly subscription basis.

Endpoint Security and Management:

An endpoint can be a computer, server or mobile device. We will install agents on each endpoint that provide remote information on system performance and logs. Malware protection software will swiftly and securely clean any unwanted or malicious files without bothering the user, and the software integrates with our own central service desk system, allowing real-time alerting to our Security Operation Centre (SOC), raising an alarm either to our SOC engineers, or directly to the client so that any unusual activity or suspected malware can be addressed. There is a vast array of monitoring systems included, such as patch status, disk space, uptime, and many more. The software also reports on suspicious or new software that has been installed, which is often be an early indication of malicious activity.
NB: Endpoint Security can be taken in isolation, or in conjunction with the more comprehensive Endpoint Management software.

Endpoint Managed Service:

Although the software is a great way to keep an endpoint secure and monitored for problems, and often the software will simply fix issues as they arise, for those issues that remain, receiving the alert alone does not resolve the problem. Our managed service means a dedicated team of qualified engineers are on hand to react to any alerts, fix issues remotely where possible without disrupting the user, and where necessary, allow easy remote access for our engineers to assist the users. We take this a step further by proactively analysing the activity on endpoints in order to identify trends. This is important because a targeted attack may well persist until a weakness is found. By analysing unusual activity, our support staff can proactively determine if an Advanced Persistent Threat (APT) is attacking the system.

ITIL Helpdesk

Our highly qualified helpdesk staff can fix issues on your servers desktops and laptops whilst (and often before) they happen. Often, these managed services can be provided without needing to interrupt you from your working day. We are available 8am-5:30pm by phone or email to assist in any way.

Project & Design Services

Solution Design & Project Management:

Riela’s design and project management services give you high quality solutions and project delivery. With a single source of accountability, communication, and escalation from experts who understand your business and technology objectives, we are able to successfully implement an integrated solution. We will engage with stakeholders in your organisation to fulfil design and project management services – on time and within budget.

Implementation and Production Support:

Our qualified engineers follow proven implementation methodology for successful systems delivery. Once live, our range of support capabilities keeps your systems operational and users free of disruptions. Support via endpoint management is our speciality, and our software provides a full security suite, automated monitoring, automated patching, and hassle free remote assistance.

IT Management Service

IT Assessment:

We will make a comprehensive and thorough review of your company’s IT estate. We assess against ideal IT management and security policies, identifying and quantifying risks and areas for potential efficiency and cost savings. We deliver a detailed itemised risk assessment in plain English to enable informed business decisions, ultimately helping your company achieve its business goals and objectives, whilst improving your IT governance, security, and operational efficiency.

IT Management as a Service

Building on the knowledge gained from the assessment, we can provide a complete IT management framework including: periodic ITMS assessments that will provide a risk management structure, solution design and project management, ongoing management reporting, full support service for infrastructure, users, and endpoint management.

Cyber Security Training

Network Operations Centre

Security Operations Centre

Cyber Risk Mitigation

Cyber Risk Management

Domain Management & Web Hosting

Hardware / Software Equipment Solutions

Infrastructure Management

Managed Services

Project & Design Services

IT Management Service

Copyright © Riela Tech 2020 (trading name 4Tech Limited)
Call : +44 1624 605675 Email : info@riela-tech.com
  • Privacy Policy
  • Sitemap
  • Terms & Conditions
Website design & build by Scorch Isle of Man