fbpx
Beach Computer

What does our SOC do?

It is easy for us to say, “You need our Security Operations Centre (SOC)” but then we are often asked, “What will that do for us?”. Here is a real-life example showing how the SOC keeps a constant watch for unusual activity in your systems. Remembering that unusual activity could mean a threat or attack.

SOC – A Successful login from Spain

Our SOC monitors the IT systems of the organisations who have signed up, including endpoints, critical applications, networks and Microsoft 365/Google Workspace activity and alerts us of any suspicious or unauthorised access.

Recently, the SOC detected a successful login from Spain, which is unusual for our business on a normal day.

The login was last week and the user accessed several confidential files and downloaded some of them.

However Diana (our CEO) was on holiday last week and she took her laptop with her. The SOC traced the IP address of her laptop and found that it belonged to a Spanish internet service provider. Each country has a unique list of IP ranges and this indicated Diana’s location. The SOC reported this incident to us initially via email and if we couldn’t respond in a set time we would have received a phone call day or night. Our SOC is authorised to block the sign in of any account that is detected as having unusual activity to help mitigate any attempt at data theft even if we ourselves aren’t contactable at the time. If you go with our SOC solution like some of our bigger clients have then you can sleep safe in the knowledge that you are being protected. However please let us know if you are leaving the country and are taking either your work phone or laptop with you! If you would like to know more, our solution works for any size of business either one man band or a corporate giant.

If you would like to know more please contact us.

Martin Mayes – by-line and other articles

Further Reading

Octagon Technology’s Security Operations Centre is Online