Against Cyber Attacks

Cyber attack prevention is essential. With attacks being at their highest levels to date, it is imperative that businesses implement the right technical solutions to protect theirs and their customers’ data. Wizuda software has been built with security and privacy by design and protects your business from cyber threats.

Below, we outline the ways in which Wizuda software can protect your business. 

Cyber Attack Prevention through Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA) is a multi-layered security, electronic authentication method that requires multiple methods of authentication, verifying a user’s login or access to a website or application. All Wizuda software comes with MFA as part of our access management system, helping to increase cyber attack prevention against some of the most common threats such as phishing, spear phishing. Wizuda’s MFA options are flexible, including;

cyber attack security company

Standard Username/Password authentication. Passwords must conform to the specified Password policy. The user will be locked out if they use an incorrect password multiple times in a row, requiring the intervention of an Administrator, or designated internal user able to reset their password and reconfirm the email address.

Wizuda can be synced up to your organisation’s Active Directory configuration. When the user accesses the website, they will be authenticated automatically based on the Windows login credentials.

Wizuda MFT includes extensive transfer protocol options, including but not limited to;

  • SFTP
  • FTP
  • FTPS
  • AMQP
  • SCP
  • Secure SMB
  • AS2
  • Azure Blob storage
  • AWS S3 Storage

Wizuda can be synced up to your organisation’s Active Directory configuration. When the user accesses the website, they will be authenticated automatically based on the Windows login credentials. This will then call back to Wizuda where the user will be logged in if they have a valid Wizuda account.

Our MFA for cyber security also includes an authenticator app. The first time they log in, the user will need to scan a QR code enabling the application to generate timed codes that can be used to verify the account and log in.

The user will receive a one-time code to their mobile number and have a specified number of seconds to use this to authenticate themselves.

Encryption by Default

Wizuda software comes with an A+ score on All files are automatically encrypted at rest with AES-256 and use a secure connection and support negotiation up to TLS 1.2 using a prioritized list of ciphers.

Secure Email & File Sharing from wizuda
Secure Email & File Sharing from wizuda

Block Malicious Content

In the event that a registered user tries to send you malicious content, Wizuda will automatically detect this and block it from coming through, sending you a notification to that effect.

Brute Force Protection

Brute cyber attack force protection is activated when the system detects several unsuccessful logins originating from an outside source. The system will then add an increasing delay to requests to that IP Address to protect the system. Internal and trusted IP Addresses can be added to the system to ensure that those users never experience a slowdown in request times.

cyber attack security company

Granular Permission Levels & Audit Logs

Granular level permissions lock down access throughout the applications providing further cyber attack protection, with audit logs giving full end-to-end visibility of every action.

To enable the maximum level of control over the actions of all users and groups of users, Wizuda allows the administrator to have full control over which features are accessible, and which actions users can perform.

The permissions can be applied individually to a specific user or to a Permission Group. These groups can then be linked to Departments or Users.

cyber attack security company

Control who you receive data from

Unlike standard email, for an external party to send you data, they need to be registered/authorised to send you data. This is a simple but highly secure cyber attack protection process whereby they receive a secure link via email, self-register (email address + password + optional MFA one time pass code).

Domain Restrictions

Email domain restrictions is a key part of Wizuda’s Cyber Attack Protection software. This is used to stop messages being sent to specific email addresses or whole domains up to country level. When a domain has been added as a restricted domain then no external users will be able to be created if their emails contain part of the restriction and data cannot be sent to them.

cyber attack security company

Protection for back-end transfers

IT departments and personnel are often tasked with setting up data transfers in the backend, commonly referred to as ad hoc batch scripted processes, in order to transfer data from/to internal and external parties/end-points. The issue with such transfers is that unless they are run through a centralised platform, they can pose cyber attack protection risks. This is due to the fact that they are typically transferred using unsecure protocols, plain text passwords and have no change control applied to them. As a result, this is often one of the first places auditors investigate when there has been a cyber-attack.

Designed to get data to where it needs to be and on-time, but without compromising on security and compliance, Wizuda MFT includes a host of features including but not limited to;

  • Authorisation workflows ensure that any transfer must be authorised by the relevant person/s before data can enter or leave your network
  • Linking transfers to Data Protection Impact Assessments (DPIAs) ensures data is transferred using the appropriate secure transfer protocols and is approved by all key stakeholders
  • Encryption by default
  • Malicious Content Blocking
  • Granular user permission levels which can be managed across multiple zones
  • Full Audit logs

Quick Contact

Contact Us