Cyber Surveillance

On the C25 platform, a 24/7 continuous vigilance service can be activated to monitor the digital perimeter, detecting botnet and high-level malware infections, leakage of sensitive information, credentials of external personnel with access to corporate and employee resources. 

One will also be able to monitor web forums (Dark Web and Deep Web) for information on possible data theft, credit cards, digital identities, and access to compromised resources. 

Quarterly reports will be provided to inform the client of the level of exposure and e-mail notifications if new exposure is discovered. Access limits will be defined based on the number of employees in the client company.

The pandemic has led to a 600% increase in attacks against large and small hotels, restaurants, and other companies, forcing businesses to prioritize cyber risk management. This is especially true now that business trips are resuming and work from anywhere policies are being adopted by companies worldwide. Guests are increasingly concerned about the security of the Wi-Fi they use to connect to corporate assets while working remotely.

The hospitality industry is an enticing target for criminals mainly due to their databases, which store gigabytes of sensitive customer data, including Payment Card Information (PCI) and Personally Identifiable Information (PII). Hackers view this as a lucrative assault vector for crimes such as identity theft and credit card fraud. Besides, the spike in lateral movement attacks has shown that hackers are turning unprotected networks into gateways for targeted attacks on businesses.

With regards to share of incidents, hospitality ranked third, with 13% of cybersecurity breaches taking place within this industry.
- Trustwave Global Security Report 2020

The consequences of such security incidents range from reputational damage to millions due in insurance payments, mitigation measures, and ransoms. Therefore, investing in proper data security can benefit both the consumer, as well as the business from loosing profits.

Tailored

Platform On Premise

DuskRise provides dedicated and separate infrastructure with three instances sized according to customer needs. The C25 platform, which provides one-way communication via https, will be installed and configured with appropriate VMs. 

Routing and firewall activities are handled by the customer's staff. Backup and recovery are also the responsibility of the customer, while platform upgrade activities are handled jointly by DuskRise and the customer. 

DuskRise trained staff will be present for up to 5 days, providing training on the C25 platform.

Curious about the C25 Platform?

Gain unprecedented visibility into malicious cyber threats and activities threatening your business with timely information.