Don't Be A Victim, Protect Your Business!

When it comes to cybersecurity, it is easy for small to medium-sized businesses to say “not me”, “they are only after the big guys.” The reality is that attacks on all networks have been increasing year after year as hackers have become more sophisticated, and small businesses are being affected every day by relaxed or non-existent security policies.

As a matter of fact, according to Bleeping Computer and Endgadget, 70% of ransomware targets small and medium businesses and 22% of small businesses hit by ransomware attacks had to cease operations.

There are a number of ways CETech helps to ensure that you protect the company you worked so hard to build against cybercrime:

Technical Security Assessment

The process of identifying PII data (personally identifiable information) and ensuring any technical gaps are addressed.

Cybersecurity Training

Employee Cybersecurity training to ensure that users have good security hygiene and know how to react when presented with a threat. This would include Phish Testing & End User Training as required under NYS SHIELD Act.

UTM (Unified Threat Management) Router

Protects against users clicking the bad links, Keeps employees from obtaining access to non professional websites, Scans downloads for viruses, blocks access from other countries to your business. Provides 'Umbrella' protection for your company and all assets that use the network/internet.

Access Control & Password Policies

The process of creating, controlling, managing, and monitoring computer accounts and passwords to ensure there is no unauthorized access.

Password Management

Enforce strong passwords, password age and length. Implement a password management tool for your company.

Two Factor Authentication

The #1 greatest protection against stolen or hacked passwords. End users require a user account, password and a random number on their phone to enter the application. MSO365 and Google Apps include this!

Dark Web Monitoring

Get alerted right away if one of your company passwords has been exposed on the Dark Web!

Backup With Business Continuity

Run your server from the cloud within minutes should it become compromised or fail. Includes nightly crypto-locker scanning. Onsite backups, offsite backups. MSO365 and Google Backups.

"ADVANCED" Antivirus/Antispam

Uses machine learning to stop conventional and crypto threats, roll back the damage and present forensics to determine if additional damage has been done. Forensic examples include: which other computers may be impacted or if the virus contacted any external databases or websites.

Foothold Protection

Attackers constantly look to increase efficiency. Once they get past your preventive security, they maintain persistent access in your network by establishing a foothold. Without tools to detect these threats, a hacker can hang out undetected for days, months, and even years.

Hardware Encryption

If your data is not encrypted, if your laptop is stolen the criminal can get to all of your files even if you had a logon password. Protect against lost or stolen laptops, desktops, cell phones, tablets. Have the ability to remote locate or wipe the device.

System Updates

Automated software patches that fix vulnerabilities in software and help prevent malicious attacks. Be sure you can report on patching status, patching doesn’t always get applied automatically like advertised!

WISP Written Information Security Policy

The written set of policies issued by the company to ensure that all users, computers and networks comply with the rules and guidelines required to protect the company.

Data Destruction

The process of destroying data stored on tapes, hard disks and other forms of electronic media so that it is completely unreadable and cannot be accessed or used for unauthorized purposes.

Physical Security

Securing PII data, such as systems, filing cabinets, and sensitive data with appropriate security, be it locks, id card readers, alarms or video surveillance.

Cybersecurity Insurance

The last defense! As awesome as we are at protecting our customers we can not prevent just one employee from clicking on the wrong attachment, web link or phishing email. Should your company be compromised you NEED the support and financial backing of a good insurance policy. If you are not sure you have this, please dont hesitate to contact us and we will get you to the right people.