Skip to content

EXTRA 10% OFF SALE, USE CODE: EXTRA10

SHOP NOW

Bag

Your bag is empty

Lavish Alice Retail Limited Security & Protection

...

All of the Lavish Alice Outbound Email systems are configured with DKIM and DMARC policies to enhance the verification of the emails being sent from the LavishAlice.com domain. This also helps to protect further against spoofing attacks. 

All Incoming emails to the lavishalice.com domain are subject to enhanced Office 365 protection policies which check all attachments and links, as well as the emails themselves. 

The Lavish Alice Office 365 accounts all have MFA enforced. All legacy authentication protocols have been blocked on the tenant level, and access to Office 365 is protected by Geo-Location Conditional Access policies. 

The DarkWeb is scanned for any data dumps containing any leaked employee credentials, which are reported to the customer when any are found. 

There is a Zero Trust solution in place on all company devices, which ensures that only known and trusted applications are allowed to be installed and run on company owned devices. 

All of the Lavish Alice Employees are enrolled in regular Cyber Security training, as well as weekly simulated phishing attacks to all users to ensure they are following best practice.

Users also have an add-in to Outlook to report any suspicious emails directly to the external managed security services team. These emails are then assessed and either blocked by the sender address, or users advised the emails are safe to open. 

An enhanced EDR solution is installed on all devices to protect against both know and unknown threats to the devices. Several layers of protection form this, including Real-time deep memory inspection technology, to ensure that there are no persistent threats allowed to run from memory. 

There is an Advanced Ransomware Detection solution on all Windows Devices, which automatically locks the PC down if any signs of ransomware are detected, ensuring any infection is stopped before any major damage is done. 

As part of the sphere, you benefit from the dedicated Security team at Apex to answer any questions, offer proactive advice when requested and to make sure the protections are set to the correct level. 

The Security and NOC/SOC team at Apex also deal with any alerts or issues raised, working to remediate these to ensure the best level of protection is provided at all times. 

All of this is backed up by a 24/7/365 SOC to make sure that everything stays secure and protected. 

The Sphere products are also assessed regularly to ensure they are providing the level of security that we expect, and if we find that a particular product is underperforming, or lagging behind the curve, the Apex team work to either get the product up to the level required, or replace with an improved solution. 

Lavish Alice also have a boundary firewall, with full Security Suite services and encrypted traffic inspection configured. This helps to protect any data coming in or out of the Lavish Alice head office.

...

Last Policy Update: 25/10/2024 by Matthew Newton.