rpbg-logo Breathing life into ICT
149 - ISP Support

Viewing: B2B | Switch to B2C

Security, Disaster Recovery  & Continuity

You cannot have enough protection. Gartner predicts that by the end of 2017, global cybersecurity spending will grow 7% to $ 86.4 billion as new and increasingly sophisticated malware, phishing attacks and high-profile hacks continue to dominate. 

Outdated security measures such as antivirus programs are no longer enough to protect your organization. Our security professionals help you implement the layered measures you need to protect every vulnerable element and endpoint of your network.

Security Assesment

Security starts with a scan and an assessment. Network and data security are essential for managing today's modern data center, but it is impossible to create your security plan without knowing your vulnerabilities. That is why RPBG offers Security Assessment services. Our team performs a vulnerability scan of a single Local Area Network and prepares an executive report with key recommendations that will increase your security and lower the risk to your organization.

Your IT security assessment consists of the following elements:

Consolidated security report

The Consolidated Security Report rates individual computers based on various security criteria. Devices discovered on the network are assigned an overall score and a specific score for each of the rating categories.  

Security risk report 

This executive-level report includes its own security risk score, summary charts, and an explanation of the risks identified in the security scans.

Security policy assessment report

A detailed overview of the security policies in effect on both domain-wide equipment as well as on local devices.

Share authorization reports

Comprehensive lists of all network shares per computer, indicating which users and groups have access to which devices and files, and what level of access they have. “Share Permission Per User Report” organizes permissions per user and lists all shared computers and files these users can access. 

Outgoing security report

Highlights deviation from industry standards compared to outbound port and protocol accessibility, lists available wireless networks as part of a wireless security survey, and provides information about the accessibility of Internet content.

Liability report for data breach

Personally identifiable customer information on computers exposes your business to liability. This report aims to demonstrate the vulnerability of your organization by identifying specific and detailed instances of personally identifiable information (PII) in your computer network that could be the target of hackers and malicious insiders, as well as calculating potential financial liability based on industry published research.

Security Management Plan

The Management Plan is a guide to move forward by ranking and prioritizing individual problems based on their potential risk to your network. If you solve problems with lower risk scores, the overall risk score is not lowered, but the overall problem score is lowered. To reduce global risk and improve network health, you must first address the issues with higher risk scores.


“Als een bedrijf die personeelsontwikkeling als prioriteit heeft, stellen wij het zeer zeker op prijs dat er training programma’s in Suriname worden aangeboden die voldoen aan onze verwachtingen. In deze uitdagende tijden, is het nodig dat er behalve een kwalitatief curriculum beschikbaar is, ook de optie voor remote-learning aanwezig is. RPBG heeft ons gelukkig in al deze aspecten van dienst kunnen zijn, en wij stellen dat zeer zeker op prijs. Gefeliciteerd met jullie 25ste verjaardag en wij wensen jullie veel succes in de verdere groei van het bedrijf.”

– Jonathan Gangadin, Superintendent
Newmont Suriname LLC

See the full testimonials of RPBG clients.

Security Monitoring

24/7 Security Monitoring

Today's cybercriminals are targeting companies like yours because even with modern security firewalls and networks, chances are you don't have the advanced detection tools to monitor what's happening on your corporate network and on the Internet. Now you can anticipate with true Security Information and Event Management (SIEM), complete with a 24x7 Security Operations Center (SOC) and trained Incident Response Team - designed specifically for the SMB market.

Prevent malware and data theft attacks 

Even advanced security tools cannot prevent cyberattacks via the Internet or email systems today. Most organizations fail to realize that malware can remain dormant on a network for months or years before sending information or launching a ransomware attack. 

Disaster Recovery & Continuity

Recovery and continuity

Recover quickly from data loss regardless of the source. It is essential to your business that your files, folders, and data are protected. In addition to that, the ability to quickly recover your data in the event of a disaster is just as crucial. In simple words, anything that jeopardizes your company's day-to-day operations will be considered a disaster if you are not prepared for it.

A ransomware crisis plan is now a business necessity. Make yours now.

How much would a failure cost your business? 

Did you know that, depending on size, businesses lose between $ 9,000 and $ 70,000 from just one hour of downtime? Organizations often think: "We are far from extreme weather, so it is not necessary to plan for disasters." However, the main reason for corporate downtime is most often caused by simple human error or ransomware and not the common misconception that it is due to weather-related disasters. What's even more surprising is that only 6% of businesses that don't have a disaster recovery plan “survive” a disaster.

So what should you do if your business is affected by ransomware?
  • Assess the problem.
  • Select the recovery type.
  • Verify the recovery and confirm functionality with users.
  • If necessary, restore the original systems.
  • Self-assessment afterward.

Do not panic! You are affected and we are ready to assist. RPBG's experts can help you with the details of disaster recovery and business continuity planning - both the physical perimeter of your data center as well as the backup of your vital business data - so when a disaster strikes, you can get your business up and running again with minimum downtime.


Need More Information?