Cybersecurity FAQ

    1. To keep systems available, protect data/revenue, and meet obligations (NIS2 and ISO 27001). We lower both likelihood and impact with layered controls across email, endpoints, network, identity, and backups.

    2. No. Most attacks are automated and probe any reachable system. We start with practical basics—MFA, EDR, email filtering, patching, and tested backups.

    3. Isolate affected systems from the network (don’t wipe or power off), preserve logs/evidence, reset exposed credentials/keys, and notify your internal lead, legal/insurer, and—where required—authorities.

      Contact iPro here and we’ll help with triage, containment, and recovery planning.

    4. Yes—iPro runs a NIS2 readiness check, maps gaps, implements required controls (IAM/MFA, EDR/SIEM, logging, backup/DR), and prepares evidence and policies for audits.

    5. Layered defenses: advanced email security/sandboxing, MFA, EDR, network segmentation, tested backup/DR, and user training with clear runbooks.

    6. Network Security, Endpoint Security, Email Security, Identity & Access Management, Application & Web Security, and Security Monitoring & Management.