How many employees can I train through the online platform?
E-learning can be purchased either by small (about 30 employees) or large organisations that want to train more than 500 people.
What makes EXATEL training different from other such trainings on the market?
The main advantage of our training courses is that they are prepared and conducted by certified experts who work in our SOC (Security Operations Center) on a daily basis and are responsible for preventive and corrective actions in case of cyberattacks, protecting us and our customers.
What topics are covered by Cyber EDU training?
The scope of the training includes basic information on risks and countermeasures (known as awareness) that is easy for any employee to understand. The e-learning course, which we make available to customers on a platform managed by EXATEL, includes a package of 7 training courses:
- Security in internal and external communication - voice communication,
- Physical security in information protection,
- Security in internal and external communication - electronic communication,
- Phishing,
- Mobile device security,
- Information and Secrets,
- Information Security Management.
Tailor-made training courses, conducted by trainers at customer's premises or online, can additionally include elements identified by the customer as key to their organisation or in their industry.
What service variants can I order?
Cyber Education is a service that provides customers with a cybersecurity training. As a standard, the customer gets the opportunity to take courses through the e-learning platform provided by EXATEL. It is also possible to have a training conducted by a professional trainer (online or in-person). In this case, the training topics, timing, and pricing are subject to individual arrangements.
Why do I need as many as two solutions – TAMA and TAMA PRO7?
To put it in the simplest way: TAMA protects against volumetric attacks, while TAMA PRO7 protects against application attacks. Both types of DDoS attacks differ in their scope, precision and targeting - volumetric attacks are characterised by their large scale and ‘power of impact’, their harmful effects are on the Internet connection, while application attacks - are targeted more precisely, and their harmful effect is on the customer's application resources. Combining these two services results in a comprehensive and optimal protection.
How is the service implemented?
The phishing programme is implemented through a dedicated platform, which allows for significant automation and eliminates problems with potential unavailability of specialists. The customer selects prepared scenarios, and if they wish to modify them, the terms of cooperation are agreed on individually.
On how large of a group are the phishing campaigns carried out?
The service can be provided to small or large organisations. There is no limit to the number of employees surveyed.
How much does it cost to run phishing campaigns?
The cost of running two phishing campaigns includes a one-time charge for launching the service - PLN 1,500 net, and a so-called subscription fee depending on the number of employees of the Customer.
Who can benefit from phishing campaigns?
The service is aimed at all companies - small, medium and large. In our experience, the companies that work in finances, banking, e-commerce, the public sector and local government’s institutions are the most frequent victims of phishing attacks.
What is phishing?
Phishing is a scam conducted to obtain sensitive personal information, such as passwords, credit card or bank account numbers. Attackers often pretend to be real financial institutions or websites, and send fake e-mails or text messages that look identical to the official correspondence. As a result, people reveal their confidential information, leading to identity theft and financial fraud. The types of phishing are: Spear Phishing, Clone Phishing, Whaling, Pharming, Vishing, Smishing.
Can the most significant changes be implemented based on the Reconnaissance alone?
Yes, the report provided as part of the service contains the necessary information to directly improve security.
How long does it take to receive a report?
The customer receives their report approximately a week after the work is completed.
Is Reconnaissance a complete examination?
No, the goal of Reconnaissance is to provide measurable results in a short period of time based on selective security verification.
What is TAMA?
TAMA is a scalable and powerful operator-grade service solution that provides comprehensive protection against DDoS attacks. It is the only solution of this kind in Poland, tailored to the needs of a telecommunications operator. The service is available in several options, depending on the customer's needs.
How does EXATEL differ from other operators in Poland?
We are a State Treasury Company. We protect critical infrastructure (military, police, government institutions, medical services, etc.), so we know the importance of data quality and protection. We are both an operator and a leader in cyber security. Additionally, in 2021, we opened our own teleport and started to provide satellite services.
What range of cyber security services can EXATEL offer me?
Our company offers a wide range of professional cyber security services. Exatel’s key services include: monitoring and incident handling by Security Operations Center, antimalware protection, data leakage protection (DLP service), penetration testing, security audit and our proprietary DDoS attack protection system – TAMA.
What can my company risk if I do not conduct a proper security audit?
Cybercriminals' methods to hack companies' systems are becoming increasingly more complex. A successful cyber attack can have a serious impact on business continuity. For example, criminals can lock down all company computers, halt production processes, and even steal company customers sensitive data.
Why do I need a security audit?
The value of data the company is obliged to protect is much higher than the cost of a security audit. In addition, companies are required to conduct periodic security audits or penetration tests.
When the penetration tests needs to be performed?
Penetration tests should be performed when:
- relevant data (e.g. personal, medical, payment card data) is processed by a web app,
- a significant part of the company's business is based on web apps made available on the Internet,
- the value of the protected data significantly exceeds the cost of the audit and other security measurements applied,
- there is a suspected breach of application, infrastructure or data security,
- your company wants to minimise the risk of an attack on IT resources,
- your company is obliged (by law, internal procedures, etc.) to periodically conduct security audits or penetration tests).
What is penetration testing?
Penetration tests consist in conducting a controlled attack on the client's IT systems. It allows for practical assessment of the current state of the company's security.
How are penetration tests implemented?
Penetration tests are implemented in three variants:
- blackbox (the tester is not equipped with any knowledge about the system under tests),
- graybox (the tester has limited knowledge about the system under tests),
- whitebox (the tester has access to all information about the system under tests).
What are the consequences of a data leak?
Disclosure of this type of data can expose a company to criminal, civil and reputational liability. A data leak would also mean a number of unplanned expenses for the company related to: identifying victims, informing those affected by the data leak and the need to provide them with certain services, PR activities, legal services, loss of customers (and issues connected with acquiring new ones) and loss of reputation.
What is data leakage?
Data leakage means an unauthorised disclosure of data outside the company through a theft or unintentional action of the company's employees. This data contains information that is protected for business (business secrets) or legal reasons (personal, sensitive, financial and medical data).
What is the EXATEL'S antimalware service?
EXATEL's antimalware solution is a comprehensive protection of customer’s IT resources against known and unknown malware. The service is provided on a central platform located in our Data Center and on the customer's devices. We provide the service on the Elevate XDR platform from Fidelis Cybersecurity.
How does malware impact your computer?
The impact of malware on one's computer can range from displaying unwanted ads (adware) and taking over computer cameras (camjacking) to locking computers for ransom (ransomware). It may happen that infected computer becomes a part of so called botnet and participates in DDoS attacks without the knowledge of its owner. Some malicious codes can steal data and lead to reputational or financial losses for the company.
Where to start in terms of organizational IT security?
The first step taken in order to create/modify a process protecting an organization against cyberthreats should be a security audit. This allows the drawing up of a map of security vulnerabilities and threats, including their assessment and recommendations for remedial actions. Starting the process by merely investing in a security system is a mistake. It entails a risk of inadequate or unnecessary costs and time loss.
Can you use TAMA on a line from an operator other than EXATEL?
Yes - one of the service deployment variants enables protection when using the line of another operator.
I have DDoS protection, so why do I need TAMA?
TAMA is an operator-class solution that is scalable and provides security up to 80 Gb/s. It can be used in combination with a smaller system installed at the customer’s premises - or instead of expensive, foreign operator solutions.
Do I require DLP protection?
Over the past few years, data security and personal data security (in particular) have become a priority. Therefore, GDPR was added to such applicable standards as ISO/IEC 27001, ISO/IEC 27032, PSI-DSS. It should be recognized that a potential leak can even lead to insolvency, regardless of its volume. This is why this threat, no matter the extent to which your organization uses IT solutions, should not be underestimated.
What is malware?
Malware is the general name covering broadly understood malicious software that is harmful to a digital device user. Malware types include viruses, worms, Trojan horses, backdoor, exploits, rootkits, key loggers, ransomware and many more.
Why is SOC as a service better than one created internally?
Using an in-house Security Operation Center is much more expensive than using professional external services. This is primarily due to the high input barrier, but also to the high cost of the ongoing maintenance. Unless cybersecurity is the core business of an (even large) organisation, it will be difficult to achieve the quality of service offered by EXATEL for a similar price.
Why do I need a SOC?
Security Operation Center is the only service that combines continuous (24/7) monitoring of incidents with the knowledge and experience of experts who are able to quickly identify and properly respond to incidents.
Are SOC services only available for large organisations?
Absolutely not. SOC services mean a whole group of products, some of which are designed for small and medium-sized organisations with fewer resources. Our team will help you choose the best solution during the first meetings.
How to convince the board to invest in cyber security. How can you help?
Cybersecurity is a process and an investment, the return from which is sometimes hard to prove in an organisation. The SOC Starter service can come in handy. The results of our specialists' work gives the IT managers solid arguments for discussion - we provide a map of threats, a plan for further potential actions, facts, figures, examples. All of this will make it easier to convince board members to invest in the organisation's security system.
What is ARFA?
ARFA is the continuation of the TAMA project - it is a set of additional modules that can be used to equip the TAMA anti-DDoS solution. Owing to new techniques added in the field of DDoS attack detection and mitigation, ARFA enables preventing, among others, new volumetric attacks.
I have three lines I want to install TAMA on. How do you price such a service configuration?
The service is priced per line.
Is it possible to get statistics on the attacks prevented by TAMA?
Yes. You will have a client portal at your disposal with presented information on alarms and implemented mitigations that are actions aimed at preventing or eliminating attack consequences.
Who can become a DDoS attack target?
The recent years have seen large corporations, as well as local government units, non-government units, associations and small-sized enterprises fall victim to attacks. The ease of conducting such an attack means that no organization is too small to be affected.