retake esp sonali task 4

 

 

 

 

 

 

 

 

 

 


TASK 4

LONGSTAFF MARKETING SOLUTIONS

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Sonali Paul Jassal



SAMPLE SATISFACTION SURVEY

Longstaff Marketing Solutions Survey

Name:

Age:

Contact number (optional):

Email (optional):

*DISCLAIMER*

This survey is designed to evaluate the effectiveness of the network and security upgrades implemented. Your feedback will help in assessing the ease of use, network security, confidence in security measures, and overall ability to complete work securely.

All responses will be kept confidential and will not be shared with any third parties.

 

The survey takes approximately 3-5 minutes to complete.

 

Questions starred with an asterisk (*) means the question needs to be answered.

About You:

·         How would you describe your technical ability? * Beginner

Intermediate Advanced

 

·         What is your role at Longstaff Marketing Solutions? *

 

 

 

 

·         How long have you been with Longstaff Marketing Solutions? * Less than 1 year

1-3 Years

3-5 Years

More than 5 years Prefer not to say

 

 

1.    How satisfied are you with the new network and security system in place? * Very Satisfied

Satisfied Neutral

Dissatisfied Very Dissatisfied


 

 

2.    On a scale of 1 to 5, how well do you think the new security measures ( Login verification, encrypted storage) protect your data? *

(1= not at all, 5= Extremely well)

 

1-

2-

3-

4-

5-

 

 

3.    What are your thoughts on how the new system impacts day- to-day operations? (Log-in delays) *

 

 

 

 

 

 

 

 

4.    How would you rate the ease of accessing the computer system for everyday tasks? (e.g., logging in, accessing applications) *

(1= very difficult - 10= very easy)

 

1 [ ]

6 [ ]

2 [ ]

7 [ ]

3 [ ]

8 [ ]

4 [ ]

9 [ ]

5 [ ]

10 [ ]

 

If below 5, please explain:

 

 

 

 

 

 

5.    Can you access all the necessary files and folders (e.g. on OneDrive, shared drives) *

 

Yes No

Somewhat True


6.    How well does the system help you complete your work securely? * Very Well

Somewhat Well Neutral

Not Well Poorly

 

7.    I have noticed security issues like suspicious logins or malware alerts * True

False

Somewhat True

 

 

8.    On a scale of 1 to 5, how reliable is your connection to network resources (e.g. email, shared files)? *

(1= not reliable at all, 5= very reliable)

 

1 [ ]

2 [ ]

3 [ ]

4 [ ]

5 [ ]

 

 

9.    Are there any specific resources you cannot access but need for your role? (e.g. shared folders, specific software) *

 

Yes [ ]

Please describe the issue:                                                                                                   

 

 

No [ ]

 

 

 

10. Do you have any additional suggestions or concerns about the new system? *


 

 

11. Do you believe the training provided was effective in terms of helping you learn new content?

 

Text Box 2, Textbox

 

12. Please rate the overall performance of the new IT system out of 5 *

 

Thank you for completing this survey! Your responses will help refine the IT upgrade strategy to better serve Longstaff Marketing Solutions.


 

Project Summary:

After a thorough review of all the control documents and the interview with the technical manager, I had identified several issues at Longstaff Marketing Solutions that needed to be resolved. The key issues were:

·         Lack of security controls

·         Lack of knowledge in mitigation and security overall

·         Less focus on regular maintenance

·         Weak, generic passwords and accounts

·         No role-based access controls

·         Shared admin accounts

·         No encryption on data storage

·         Using a SOHO router that is not meeting the needs of the organisation

·         No regular staff training

 

 

 

Identified Solutions:

Replacement of SOHO router-

Having a SOHO router which was used in the home office environment and then was still in use when moved into an office environment, was a huge concern for us.

Therefore, to make sure the network was upgraded and was meeting the needs of the business, we decided to replace the SOHO router with a Fortinet FortiGate 60F firewall. This is because we believe, the router was not enough for the growing organisation and was a great vulnerability, as it could have posed the organisation to more at risks to attacks and being frequently targeted by cybercriminals due to its weak security configurations. Furthermore, it had a limited device capacity as SOHO routers a generally designed to handle a small number of connected devices such as 10-20. So, implementing the firewall that is also a router, was a great change to make as it allows to provide connectivity to a lot more devices. It also significantly improves security as it provided advanced threat protection, multi-layering security but importantly prioritises business critical applications by ensuring high quality performance for cloud connected services and remote access.

 

 

Identity and access Management and Data Storage-

Another concern was that the organisation had no role-based access controls and all employees were sharing the admin accounts. This was clearly a concern as there was no consideration of security as staff were allowed to access any material they wanted and this maximised the risk of unauthorised access to sensitive data and systems. In addition, as the User C stated, uses were adding files such as movies and games to the NAS device and that was clearly not work related, this was a


 

misuse of the company’s resources and the admin privileges staff had and made it quite hard for IT staff to trace who was installing non-work-related materials.

Therefore, we decided to implement cloud-based solutions for the file storage, Microsoft 365 OneDrive for staff files and AWS S3 for sensitive files. This way it was easier for admin to manage and restrict staff from accessing sensitive files. To introduce RBAC (role-based access control) we decided to introduce Azure Active Directory Premium P1, as firstly It would have allowed to apply Multi-Factor Authentication when logging in, to make sure there was less of a risk to unauthorised access, it also provides detailed logs and reports on user activity, sign-ins and access request which helps in staying compliant with GDPR. Not complying with rules and regulations would have posed a huge risk to Longstaff Marketing Solutions as it would have led to the business suffering financially from penalties but also losing their reputation and trust.

 

 

Remote Device Management-

There was nothing in place for management of remote devices, which meant if there was an issue with a remote device, the IT staff would have physically accessed the device to troubleshoot or fix the issue. So, to resolve the issue, we decided to implement Microsoft Intune, which is a cloud-based endpoint management solutions that help with Mobile device management. With this in place, it allows for IT to configure, update or wipe devices remotely which was crucial for the 15 employees who work remotely. Furthermore, it means it consumes less time and does not delay productivity and crucial activities that may be urgent.

 

 

Security Monitoring and Auditing-

Having a detection system in place and regular audits being carried out, it can bring a lot of benefits to the business. Consequently, we decided to add AWS CloudTrail to log access to the AWS S3 data and Microsoft Sentinel to monitor the FortiGate 60F, Azure AD and device activity, with Microsoft 365. This is because being able to have real time monitoring can allow for any security issues to mitigated quite quickly, reducing the threat of the incident worsening over time and creating real damage to the organisation, such as having to pay up to $20 million due to legal consequences. Being able to audit can benefit the organisation as it creates more transparency with what has been accessed, why and who has been accessing the information.

Furthermore, if there was a security breach to occur, having an audit log will be able to provide a lot of the information which will be highly detailed, enabling IT staff to trace the source.


 

 

 

Staff Training-

By trying to encourage Staff training through Microsoft Learn cybersecurity Modules, it will allow to upskill employees on modern threats and best practices. Also, without training, staff can be the weakest part of Longstaff Marketing Solution’s security.

Furthermore, if employees fall for scams, then it cannot be undone, However, through training you can prevent that and turn the risk into a strength. It will also benefit the company as a whole as they will be more aware of how to use the upgrades properly and spot threats before it occurs. For a fast-growing company that handles sensitive data, it is crucial.

 

 

 

Mitigated Security Issues:

 

 

The security issues that were mitigated were:

·         Unauthorised access- This was mitigated through implementing Azure Active directory and Role-Based Access control, clearly eliminated the use of the shared admin account, provided more restrictions on what was being accessed. Moreover, it allowed to apply more security measures in place such as going through multi factor authentication to reduce unauthorised access to the system

·         Network Threats- This was modified by replacing the SOHO router with a firewall to reduce the number of vulnerabilities and weak security configurations the router had. This did in fact provide a lot of benefits as it’s more advanced in threat protection but also provides a TLS inspection to detect any hidden threat in encrypted traffic.

·         Lack of Monitoring- By adding Microsoft Sentinel, it has a feature called anomaly detection which flagged suspicious activities such as unusual login patterns, which is quite useful in monitoring as it gives a clear overview of the activity. Also, adding AWS CloudTrail has helped in logging data access.

·         User Awareness- By adding in training for staff, it will highly likely help staff in being more aware of incidents and emerging threats of today. Moreover, it will reduce any insider threats there may be.


 

Evaluation of my own performance:

 

 

As a whole, I think my performance in time management was great for all the tasks except task 3 as I had to spend a bit of time researching for products and the best prices I could find, which took me a bit of time. Also, I think I wrote less for some things that need some depth and explanations. I did struggle on going in depth with my task 3 as it got confusing at some times due to a lack of knowledge in some areas. However, I did manage to find everything I needed with further research.

 

Here are some things I thought I did well in:

 

·              Time management for tasks 1,2 and 4

 

·              Structuring and layout

 

·              Network topology

 

·              Identifying the issues and concerns based of the scenario.

 

Here are some things I thought I could improve in:

 

·              Writing in more detail and depth, expanding on some answer that may need it.

 

·              Trying to gain more knowledge in some areas to help me understand products and specialist terminology when researching.

 

 

 

Self-Evaluation Using Gibbs’ Reflective Cycle

 

 

Description- I could take the scenario of Longstaff Solutions and was able to understand and implement solutions based on their requirements and needs.

Feelings- I was optimistic about the technical solutions provided and relate it back to the scenario

Evaluation-My strengths was identifying the issues and why there was need to make a change. Furthermore, I could understand the business needs such as selecting scalable solutions for future plans

Analysis- Time limits on task 3 led me not make comparisons and make alterative suggestions but also not provide more details where it was necessary.


 

Conclusion- The project managed to hit all areas and objectives that were needed, but could have better panned with time to make sure it can be highly detailed and sophisticated.

Action Plan-For future projects, I would like to work on time management to allow more time on providing more detail and provide comparisons but also make sure to have some background knowledge to further aid me.

Comments

Popular posts from this blog

TASK 1 MINE FULL

Eveything TASK format

Full format what i done at home questions