
Browser Hardening: Shutting the Door on Infostealer Data Theft
Web browsers store sensitive data. Lock them down with hardening strategies to prevent infostealers from stealing passwords, tokens, and session cookies.
Contingency planning solutions, such as Business Continuity & Disaster Recovery (BC/DR), are integral to our approach to mitigating and managing risk and responding to incidents, and an on-going responsibility of our organization, to both our employees and our customers.
Admin By Request parent company, FastTrack Software, uses Microsoft Azure’s IaaS (Infrastructure-as-a-Service) model to provision all infrastructure fundamental to delivering our cloud service, which includes servers, storage, databases, and networking resources.
Requirements are enforced for all remote employees, including use of Multi-Factor Authentication (MFA), Virtual Private Networks (VPNs), and encrypted hard drives. Operating systems must be kept up to date and patched installed immediately. for our customers, we provide a detailed Contingency Plan stipulating what they can do to minimize risk of data lose the case of software outages.
We take regular cloud and cold storage backups of customer databases and source code to minimize risk of losing data during an incident. Rigorous and ongoing security testing and vulnerability scans of software and files are conducted after release to minimize likelihood of exploitation.
Our contracts with suppliers of services critical to our own Admin By Request service include a requirement of assurance, along with evidence, that comprehensive Business Continuity and Disaster Recovery measures are in place within that supplier’s organization.
Get the emergency email and phone contact of your Territory Director, instead of being routed to the generic Support email.
Each scenario described in the Contingency Plan offers a business impact rating of either Low, Medium, or High - so you're aware of what you're facing.
Here we outline a range of possible scenarios that could occur and list the remedial actions that can be taken to gain access to data and services.
Web browsers store sensitive data. Lock them down with hardening strategies to prevent infostealers from stealing passwords, tokens, and session cookies.
Small doesn’t mean safe. From ransomware to social engineering, find out why SMBs face growing cyber threats and how to defend your company effectively.
Cloud or on-site PAM: same goal, wildly different day-to-day reality. Know which one aligns with how your team actually works.