Volunteering in the West

Ways to enhance existing security tools and eliminating wasteful spending.

Background

A prominent global leader in economic empowerment based in Latin America reached out to Muuntower with a pressing challenge. They fundamentally lacked robust security controls and a roadmap to manage their perimeter network as well as a large, distributed global workforce. With an extensive list of IT and security projects, Muuntower first sought to understand the increasingly complex architecture, to include mobile applications, and the results of past security assessments.

Industry:
Social Enterprise
Location:
Colombia

Solutions

  • M365: Oftentimes threat actors will target inactive or stale accounts in M365. To prevent misuse, we identified an opportunity to better manage the users and their levels of access within the nonprofit's tenant.
  • External Security Assessments: Our partner was unclear on the state of the perimeter network and the effectiveness of the defenses in place. When this occurs, it's imperative to immediately map the external network and identify gaps.
  • Security Awareness Training: The paid and volunteer workforce of our partner amounted to an enormous number, creating ample opportunities for attackers to launch phishing campaigns as well for educating the staff.
  • Social Engineering: If validating the effectiveness of security awareness training is important to your nonprofit, social engineering engagements can bring quickly surface gaps in your staff's knowledge.
  • Weekly Consulting Calls: With lots of moving parts, it's critical to adjust plans accordingly and stay on top of the latest changes to your security projects. Ongoing consulting such as our Muuntower Remote Cybersecurity Expert can assist in keeping things moving forward.

Results

Some quick wins followed swiftly upon beginning to work with our partners. The staff became more aware of current trends and threats in phishing, and our weekly consulting calls facilitated constant alignment with the original project goals, with minimal deviation. Business email compromises and fraud are among the most common and damaging events nonprofits can face; therefore, hardening the existing controls and aligning them with best practices provided peace of mind to the organization's leadership.

menu