How Do We Guarantee IT Security?
To prevent and defend against attacks, our Security Information and Event Management (SIEM) system serves as a core component of our security infrastructure. It enables us to proactively monitor and identify attack vectors and detect any abnormal behavior. Our SIEM collects data from event logs, firewalls, security tools, and devices across our organization, providing our security team with the necessary information. It also supports compliance and regulatory reporting.
We employ state-of-the-art firewall systems to securely network our sites, ensuring protected connections and minimizing the spread of malware in the event of an attack. These firewalls also establish secure connections between home office computers and our company's servers. Additionally, our network is segmented within sites to provide redundant protection for sensitive areas.
Testing and Adapting Systems
- Security training and stress tests
- Regular review and update of internal policies
- Performance of self-audits
- Participation in external audits
- Execution of outage simulations
Protecting
- Use of the latest firewall systems
- Deployment of backup and restore tools
- Effective end-device protection
- Encryption of internal data storage media
- Multifactor authentication for all critical systems
- Security Information and Event Management (SIEM)
- Privileged Access Management (PAM)
- Endpoint Detection and Response (EDR)
- Vulnerability Management (VM)
Always Up To Date
Our IT department plays a crucial role in managing company devices, ensuring they are regularly updated with the latest security patches and equipped with endpoint security tools. Vulnerability Management (VM) is employed to efficiently detect and address vulnerabilities, providing a comprehensive overview of areas that require attention and facilitating priority-based security patch management across GELITA.
Employees as Gatekeepers
In addition to technical measures, GELITA prioritizes employee awareness and training to prevent cyber-attacks. Recognizing that external assailants target employees as a weak point, GELITA collaborates with leading providers to offer monthly training programs and simulated attacks, empowering employees to identify and respond to potential threats. The positive feedback from employees and the ability to report suspicious communication attempts contribute to the secure use of all communication channels within the company. GELITA's efforts in cybersecurity training have resulted in better performance than the industry average.