Measurement Id G-E9CWY4VHZF

FAQ

To put it very bluntly, the downtime your organization experiences can be a lot more expensive. Whether the result of out-of-date hardware and software, incorrect configurations, or malicious parties looking to do you harm, putting out fires is rarely as efficient as preventing them. Unless you are blessed with generous, open-ended budgets, your team probably focuses most of its time on day-to-day, tactical tasks rather than the big picture, long-term planning, or tracking the never-ending developments of the IT ecosystem. It’s simply too much to do – or more specifically, to do right. Our team is here to allow you to continue on the tactical aspects of running a network environment, working with users and the specific task-oriented challenges they bring. We ensure your infrastructure is solid and protected, to let you get that job done.

Actually, not so much. Your cybersecurity depends on the integrity of your network: communications, user access tools, permissions, backups in the case of a successful attack, security updates, and patches. The two challenges are intertwined – for general network support, you want to avoid surprises; for cybersecurity, you want to minimize risk. With two vendors, you’ll need to manage a lot of interaction between them, sometimes involving friction and debate over responsibility – ​​both during routine work and during a crisis. Our team has both aspects covered – either in a single individual or coordinated independently and seamlessly within our team.

We provide:

  1. Technical (to discuss with Technical team)
  2. Executive (To discuss with business leadership)
  3. Attestation letter (For insurance companies)

We’ll answer that with a question: If you owned a bank, would you let all of the tellers work from the same till? Would you let your CFO use the same office as the customer support team? The separation of duties and a permission-based structure are crucial for any network, just as they are in the rest of your business.

Proper segmentation (VLANs) structure assists with maintaining proper security between the different security groups (examples: corporate network vs. guest network, or defining limits, e.g., the sales department doesn’t need access to the accounting network…)

Awareness is considered the primary and essential first step in “personal firewall” strategies. The more each user knows, the better your organization will be equipped to recognize potential security issues. Many, if not most, breaches have their roots in the “human factor.”

The most expensive defensive technology can’t protect you from an employee clicking on the wrong email. The “human firewall” is indeed necessary for a cybersecurity program. We cover this area of training, in addition to the technical tools.

Absolutely not; it’s like allowing random people walk through your house without watching them. Even if you technically know who they are, you don’t know what security risks they bring with them, usually unknowingly.

This is a personal preference when the question is about someone seeing your “messy office.” But from a cyber security perspective, it’s best not to show off what your physical facility looks like. Even if you trust the person on the other side, doors, windows, security systems, etc., can all be leveraged by a third party who manages to hijack and reviews recordings of the session. Always maintain a mindset of sharing “least amount of information,” or, as we refer to it in the industry, start from a position of “zero trust.”

Both from security and reliability perspectives, managing devices individually is never best practice. From an administrative level, you want all machines to be uniform and standardized when it comes to updates and patches. Tackling each machine individually causes confusion, wasted time, and mistakes. 

Virus protection is one of the first levels of management for devices. It’s easy, it’s inexpensive, and the companies providing the software are doing the heavy lifting for you. One serious breach can easily cost more than the fees you tried to avoid.

This is a fascinating question with a multi-faceted answer. As a business owner or manager, measuring productivity is important. But more important than this is measuring risk that can unravel all that productivity. 

But that’s not necessarily a resounding “yes” to the question; this is a business decision, depending on your scenario -– both business workflows and your relationship with employees who you do or do not trust to have complete freedom/access during business hours and from business devices. In a data entry business, for instance, viewing YouTube videos is, almost by definition,  outside the parameters of the basic job. You can be flexible, or strict. If an employee Googles “explosives,” does that increase your liability? It’s hard to know. DNS filtering, though, is definitely a good way to keep out certain types of traffic that can grossly affect (meaning, slow down) your network and machines.