Cyber-Security Service
Risk Assessments
With having many federal and state laws protecting data, security is more important than ever and taking risks is no longer an option. We offer a total assessment that can be used to check up on your IT systems to meet regulatory or contractual requirements or to get a second opinion.
We assist your team with completing an administrative, physical, and technical security risk assessment of Personally identifiable information (PII), sensitive personal information (SPI) and sensitive company data.
Dark Web Breach Reporting
We scan the Dark Web looking for accounts that are associated with your company’s email domain account. Criminals and hackers use the Dark Web to buy and sell stolen or hacked information. Account information found on the Dark Web can be used for scams, phishing emails, social engineering scams and identity theft among other uses. Making employees aware that they may be a target of scams will help raise their defenses. Continuous security awareness training and simulated phishing attacks will give them the information that they need to identify scams and spot phishing emails.
Simulated Phishing Email Service
Continuous phishing awareness training is needed to keep your employees vigilant in looking for and avoiding malicious links. We can plan simulated phishing attacks to your end users. We will measure the “click-through” rate and report our findings. Any user who clicks on the link will be directed immediately to a short training video.
Security Awareness and Newsletter
Satisfy your security awareness compliance obligations with this service. To reinforce our annual training program, we provide weekly micro security training videos and a monthly security awareness newsletter to your employees.
Security Policies and Templates
Our security expert team provides templates for your customization for Written Information Security Policies that address data security including administrative, physical, and technical safeguards. Our cyber-security service also establishes security policies that are monitored and checked daily for violations and administrators can be alerted of issues for immediate investigation.