Secure DNS

Secure DNS helps your employees protect the company’s data
Danish security system makes it harder for hackers to pull data out of your company.
The internet connects us across countries and continents. Nowhere on the planet is more than a click away.
We constantly use the internet to communicate and exchange data and files several times a day.
It is easy and straightforward to get things done online and for a modern company the internet and the internal network are the pivot points that make the company work.
But the easy of the internet has a downside: Hacking.
It happens everywhere. Right now. Massive amounts of cyber attacks.
Who gets hit?
Hack me here. Hack me there. Hack me everywhere.
No one can feel safe. Hackers break in everywhere: public authorities, organisations and private companies.
The Ministry of Defence has tried it. So has the Danish Maritime Authority. And the Ministry of Foreign Affairs. Municipality of Aarhus. Faxe Kalk. Glostrup municipality. SF. Faaborg-Midtfyn municipality. And Novozymes.
The list of companies and authorities that have been hacked is long. It is certainly also longer than what is publicly known. Not all companies and organisations want to flaunt their vulnerability in public.
No matter how many hacked organisations we get to know about, the list clearly shows that IT security isn’t just something that public authorities and large corporations should prioritise. It is also a must for small and medium companies in Denmark.
”We’re all connected via the net and we solve many of our tasks on networked computers,” Morten Møller Holst from the security company Defendas explains.
”It makes us vulnerable and it means that all companies – large as well as small – can be hacked.”
How does it happen?
When a hacker breaks in it happens in disguise and systematically.
The hacker gets in where it is easiest – through the employees.
The employee is probably really good at what he does, but he is rarely talented when it comes to IT security. He is therefore the weakest link and the hacker knows it.
You probably know it from your own company:
An employee receive many emails every day. From customers, contacts and people he doesn’t immediately know.
He is busy. He is efficient.
One day he gets a email from the postal service or the tax authority. A email that contains a link to click on. It could also be a email about a payment which has an attached file, you can click on to see the statement. Or may the boss asks via mail for you to transfer some money.
One click is all it takes and the hacker is in.
Many names
A hacker attack has can have many names: Phishing. Malware. DDos-angreb. Ransomware. Force login. Cryptolocker. CEO fraud. Watering hole. Spear phishing. Smishing. Social engineering. Defacement.
No matter the name, the hackers attacks have the same goal: To gain access in order to collect data. It can be passwords, business secrets, personal information. Or it can be about getting an employee to perform a certain task such as transferring money to an account.
What is important to know
Centre for Cyber Security CFCS (the Ministry of Defence’s Intelligence Service) is the official Danish cyber watchdog. The agency assesses cyber threats directed at Danish authorities, companies and organisations and provides advise.
CFCS advises all organisations, privates as well as public, to increase awareness and work harder at protecting themselves against the challenges of the internet.
The Danes are prime targets for cyber attacks,
The Danes are prime targets for cyber attacks, because we are so advanced in terms of digitisation and use the internet for virtually all of our business, both professionally and privately. And in conjunction with the fact that the internet moves at high speed, it makes us vulnerable.
”Authorities and companies are under constant demand to develop their cyber security and readiness,” the CFCS writes in its threat assesment from February 2017.
The CFCS encourages companies to handle the cyber challenge based on three elements; Process, technology and behaviour.
And what does that mean?
Process consists of looking inside the company and assessing which data is important to protect. It’s also about having a plan for what happens if the protection fails.
Technology is about the company knowing its own infrastructure included the places where it is vulnerable.
Behavior</ strong> is about informing and educating employees in how they safely perform on the internet and in the company’s IT system.
What can you do to avoid hacking?
Hacking is like a vaccine: Before it is discovered and copied it can’t be produced and used preventively to stop a new hack. And hacks, like viruses, tend to mutate.
What can you do, when you want to protect yourself in the best possible way?
You make it as hard as possible for the hackers.
You have probably already made sure that your company has antivirus programs installed on all your computers. That is good and a very important step in the barrier against breaking into your IT systems.
You can increase your company’s security further and make it even more difficult for the hackers by using secure DNS.
Secure DNS is a systematic cool that prevents hackers from smuggling anything out of your IT system.
What is Secure DNS?
Secure DNS is a system that monitors your internet traffic and responds when your network is hit by malware and ransomware. It blocks known malicious content and closes gaps when your network is hacked.
In practice, it means that your business is better protected. Not against being hacked, but against the hackers successfully pulling data out of your business.
For example, if a hacker wants to cryptolock one of your computers, he first sneaks ransomware on to your system via a link in an email. Then the ransomware needs to go back out to the internet to get a key to cryptolock the computer and paralyse your network.
Secure DNS prevents this, by intercepting the ransomware and blocking it, when it tries to retrieve the key from the internet. At the same time you are notified that something is wrong, before it goes really wrong!
A wealth of data
Secure DNS is based on one of the market’s most comprehensive intelligence systems within gateway products. A gateway is the traffic hub you must pass when you want to visit different networks and websites.
It is a wealth of data about hacks, hackers, methods and domains, that previously have been used to hack IT systems.
The system is based on extensive intelligence and intercepts 70.000 new malicious domains every day. It monitors hacker groups, botnets and the algorithms that are used by hackers worldwide.
It is the independent security company CSIS, that is behind Secure DNS. CSIS is often used by police, governments, companies and medias in cases involving cyber security and threat intelligence.
Do you have an overview of your company’s security?
If not, we can help you?
Contact Gravgaard & Co and let us talk about how you can secure your company and your employees against the contant threats from the internet.
You can aslo read the article Hacking er blevet hver mands, myndigheds og virksomheds eje