Skip to content

Services

Risk Based Assessments

No two businesses are alike. Whether you handle payment cards, medical data, or just want to keep your customers’ personal information safe, get security that’s tailored to your needs.

Our expert Security Architects will assess your organization against tailored Information Security standards. You may be covered by a regulation like HIPPA for medical data, or PCI-DSS for credit card data. If so, your assessment will include those frameworks. If not, your assessment will be based on the security framework that makes the most sense for you.

We’ll interview staff, review technologies and tools, and analyze business processes. Security isn’t all about technology!

We’ll discuss the threats you’re concerned about most and how they could affect your business. We’ll take a look at the type of data you have, the protections you already have in place, and how you could recover from a security incident. At the end of the assessment, you’ll get a report with all the findings.

This assessment puts you in charge and in control of the security of your business.

Security Awareness

Our expert Security Trainers create customized security training for your organization. This class is for small business owners and their employees. This isn’t a dry, boring lecture; it’s a place to ask anything you ever wanted to know about security, without judgement.

We’ll interview staff and analyze the business to find out what you already known. Then, we’ll fill in the blanks.

Learn how to spot phishing, how to stop ransomware, and other security tricks and tips you don’t have to be an expert to use. It’ll be tailored to your business and driven by your questions. The aim is to demystify security as an arcane topic that only “computer people” know, and to take the fear out of the media headlines. You already know your business, now learn how security impacts it.

Practical Recommendations

There are hundreds of security tools on the market today and it’s hard to know what would be helpful, what needs a whole technology staff to run, or what’s plain snake oil. Your assessment report will contain practical recommendations about how to improve your security, based on what makes sense for your business. When a tool is recommended, several options will be included — it’s rare there’s a single tool to meet a security need. Each recommendation will come with a “pro” and “con” list to help you make an informed choice about what to implement and what to skip.