Small & Medium Enterprises
A few servers, some cloud, maybe a local IT provider. SMEs are often the easiest target for attackers. We check what your IT provider doesn't cover day-to-day.
Common Vulnerabilities in SMEs
RDP on the Internet
Remote Desktop (Port 3389) directly accessible from the internet, often without VPN and with weak passwords. This is the number one entry point for ransomware.
Outdated Servers
Windows Server 2012, unpatched Exchange systems, old NAS firmware. Known vulnerabilities like EternalBlue are still actively exploited.
Default Passwords
Routers, printers, NAS and IoT devices with factory passwords. "admin/admin" is still frighteningly common. Attackers know it and exploit it.
No MFA
Email, VPN and cloud services protected by password only. A single phishing attack is enough to give attackers full access.
Backup Only on NAS
Backups on the same network drive as production data. With ransomware, everything gets encrypted, including the so-called "backup".
Trusting your IT provider
The IT provider "handles everything". But what exactly? Often there is no transparency, and security is not in the maintenance contract.
Our SME Solution
External Vulnerability Assessment
- Scan of all publicly accessible services of your company
- Identification of exposed ports (RDP, SMB, outdated web servers)
- Prioritized action plan: what to fix first, what can wait
Managed EDR for Small Teams
- Enterprise protection starting from 5 endpoints. No in-house IT department required.
- We monitor, you work. No alerts on your screen.
- Monthly cancellation, fair prices for small budgets
Quick Wins Check
- Enable MFA for Microsoft 365 and VPN
- Hide RDP behind VPN or turn it off completely
- Set up offline backup (USB, cloud, or both)