IT SECURITY

Backup and recovery

We specialize in innovative solutions to protect your data even in case of fire or theft of IT equipment, thanks to encryption and backups according to the 3-2-1 rule. We prepare a backup plan, a disaster recovery manual, and test data recovery at least once a year. All this to make sure we recover our data when we fall victim to a cyber attack.

Customized safety procedures ensure that the company is up and running in an acceptable time even after a “total disaster” avoiding irreparable losses.

What is the 3-2-1 backup rule?

The 3-2-1 backup rule is quite simple and says:
Store 3 copies / replicas of data / copies of data.
Use at least 2 storage technologies/data storage media.
Consider storing data in 1 remote location outside the main data center.

Software security

Up-to-date operating systems, antivirus software, firmware for routers, network devices, servers or laptops is key to hindering an attacker’s efforts. We make sure that these operations do not interfere with work and take place outside the client’s working hours.

IT Training

Employee awareness training makes the weakest link – the human being in the cyber world – immune to the attacker’s wiles. We support end users and always provide support as soon as they have concerns. There are no stupid questions with us, and it is better to call than to click with the thought “somehow it will be”.