IT security and effective collaboration in a small company.

The client changed their perspective on IT security and access policy management after our intervention. In addition to physical security, they began to recognize the importance of digital security and appreciated the new opportunities for teamwork and communication, which now take place in a controlled and secure manner.

Find out

About the Company – Client

Law firm.

Client’s Needs/Requirements vs. Initial Situation Identified by IT Audit

The client perceived the state of information technology as functional and secure.

Additional security risks:

  • Data theft by a third party, which is highly undesirable in the legal sphere.
  • Data encryption or attack by other types of malicious software.

Additional work efficiency risks:

  • Inability to securely access files outside the office.
  • If the client needed to print something, the employees would email the document to each other, they were not trained to work with the data storage, despite having it in the company.

Comprehensive Custom IT Solution

  • We deployed a physical on-site server with a lifetime warranty, designed for small-scale networks. We did not choose a cloud solution for data storage and infrastructure security due to a lower return on investment over a five-year horizon.
  • Thanks to virtualization, we were able to install a firewall and Microsoft Windows Server on a single physical device, which contributed to a higher efficiency of financial resources and significantly reduced the time needed for work recovery.
  • We moved email communication to a Microsoft 365 cloud solution.
  • We secured the WIFI network by dividing it into a company network for employees and a visitor network, which only operates the internet and from which it is not possible to connect to the private network.
  • We implemented multi-level data backup as protection against human error, virus attacks, and other threats.
  • Data is protected by encryption, which significantly increases its security.
  • The network was protected by a firewall with the possibility of remote and secure access to files and systems via an encrypted connection (VPN).
  • The ability to connect a mobile device to the company mail was technically ensured by a supervisor approval process.
  • In addition to the primary internet connection, we also set up a backup, which allows work to continue even in the event of a main service outage.

Client’s Feedback

The client changed their view on IT security and access policy management after our intervention. In addition to physical security, they began to perceive digital security and appreciated the new possibilities of team work and communication, which now takes place in a controlled and secure manner.

Project in Numbers:

  • Man-hours worked: 70 hours, of which 22 hours were over the weekend
  • Number of technicians involved: 2 technicians
  • Amount of data backed up: 1,000 GB
  • Amount of migrated emails: 10 mailboxes, 105 GB