Caminar Technologies

Services

Cybersecurity

Services

Cybersecurity

Cybersecurity and physical security is not just about technology. While technology plays a substantial role, alone it is not enough to protect you from modern vector attacks. Caminar Technologies follows the ISO 27001 standard that recommends every comprehensive security solution address all areas of information security risk including people, processes & technology.
 
By following this standard, we are confident we can help protect your mission-critical assets, and bring the solutions required to protect, monitor, and respond to attacks from all vectors – protecting more than just your data and your network, but also your brand and reputation.
 
Caminar understands that business email and related information is highly sensitive. This is why we have implemented strict procedures and processes to safeguard valuable data regarding our hosted email and collaboration offering, systems, and related operations. Below is a brief breakdown of the safeguards in place to protect your data: 

  1. Firewalls – Caminar uses market-leading firewall appliances for additional protection. Packet filtering, anti-spoofing, and access control lists are enforced at this layer. This additional layer of protection will offer even more security and reliability to users and customers. 
  2. Anti-Spam/Anti-VirusAll incoming emails will be filtered for viruses and malware. The world-leading Cloudmark engine is used for virus and malware scanning. Emails containing viruses or malware are detected and eliminated before even reaching the Microsoft Exchange platform. The vast majority of the settings can be administrated at the Company level and/or at the user-level.  Users will be able to control spam filtering options (i.e. control level, black list, white list, etc.) through their end-user control panel.  Finally, Users quarantined items will be located in the “Junk Mail” folder of Outlook from which they will be able to restore or delete items.  
  3. Advanced Threat Protection – Caminar uses various tools to monitor your network traffic for suspicious user activity and operational anomalies. By reviewing suspicious activity at the network level, we can react, recover and remedy threat actors before they make it to your computer or company data stores.
  4. File Backup and Restore – Caminar understands company email and related information is highly sensitive, which is why it has also implemented strict procedures and processes to safeguard valuable data

The above are the proactive measures Caminar takes, but we also understand that no protection is foolproof. Threat actors are forever changing their methodology of attack and there are some instances in which they may be successful. If this was ever the case, Caminar has a full-measured response available to ensure your business is back up and running with as minimal downtime as necessary. 

Some easy-to-follow practices to avoid phishing attempts are:

  • Know what a phishing scam looks like.
  • Get free anti-phishing add-ons.
  • Conduct security awareness training.
  • Use strong passwords & enable two-factor authentication.
  • Rotate passwords regularly
  • Implement anti-phishing tools
  • Exercise caution when opening emails or clicking on links
Contact Us