Security

Small businesses may feel that they aren’t likely to be a target due to their size and that hackers couldn’t possibly be interested in what they do – but in reality the exact opposite is true. 

Hackers prey on the knowledge that small businesses often have lower defences than larger organisations, usually due to lack of financial and human resources. By their very nature, thriving small businesses are innovative and niche, which again is very attractive to the bad guys who may be interested in customer data or intellectual property and know exactly how to pick out the weak targets.
  
We design and deploy business systems using some of the most rigorous security practices in the industry and our support team detect and respond to threats from both insiders and external actors, 24/7/365. It's just a small part of our standard service at Ostratto.

All of our systems come with the following as standard:

Internet communication

Communications over the Internet to the cloud services are encrypted in transit. The network and infrastructure have multiple layers of protection to defend your business against Denial-of-service attacks.

Identity

Identities, users, and services are strongly authenticated with multiple factors. Access to sensitive data is protected by advanced tools like phishing-resistant Security Keys.

Storage Services

Data stored on the infrastructure is automatically encrypted at rest and distributed for availability and reliability. This helps guard against unauthorised access and service interruptions.

Service Deployment

Any application that runs on the infrastructure is deployed with security in mind. There's no trust assumed between services, and  multiple mechanisms are in place to establish and maintain trust. 

Hardware Infrastructure

From the physical premises to the purpose-built servers, networking equipment, and custom security chips to the low-level software stack running on every machine, the entire hardware infrastructure is Google-controlled, -secured, -built, and -hardened.
Google data centres feature a layered security model with custom-designed electronic access cards, alarms, vehicle access barriers, perimeter fencing, metal detectors, and biometrics. The data centre floor features laser beam intrusion detection.


The data centres are monitored 24/7 by high-resolution interior and exterior cameras that can detect and track intruders. Only approved employees with specific roles may enter. Fewer than one percent of Googler's will ever step foot in one of their data centres.

There's no more compromise on cyber defence for smaller businesses. 

Interested in hearing more?