fbpx
Help 610.590.4858   Information 610.937.0900

Our Cybersecurity Plan

Are you secure?

It’s a simple question with a sometimes not-so-simple answer.

40% of small to medium-sized businesses that use the internet will have their network accessed by a cybercriminal, and more than 50% won’t even know that they were attacked. (Source: Gartner Group)

What could a cybersecurity breach do to your business?

• Stolen client information
• Stolen accounting data and monetary loss
• Ransomware attacks
• Spyware
• Viruses
• Malware
• Data destruction

…and that’s just the beginning!

So how can you protect your company?

The cybersecurity landscape is always evolving, so you need a cybersecurity plan that evolves with it. TechBldrs has developed PentaGuard as a comprehensive framework to ensure that you’re protected, and that in the event that anything were to happen you can resume business as quickly as possible.

PentaGuard is made up of five core areas that work together to tackle even the nastiest cybersecurity threats head-on.

These are the five sections of PentaGuard:

Identification
Protection
Detection
Response
Recovery

We’ll break them down for you so you can feel confident in the service we provide.

Identification

You can’t fix a problem if you don’t know it exists. Identification centers around the development of an organizational understanding of the current cybersecurity risks to your systems, assets, data, and capabilities. Recognition of possible dangers enables your company to focus and prioritize your efforts in a way that is consistent with your developed risk management strategy.

We’ll help you develop an understanding of the current cybersecurity risks your company faces, which will allow you to focus and prioritize during the implementation of PentaGuard.

During the Identification process, TechBldrs assesses:

  • Your current data backup and recovery system
  • Your company’s remote access capabilities
  • The current level of employee cybersecurity education
  • Company password and security policies
  • If you have an email SPAM filter, antivirus, and/or website blocker in place
  • How you handle hardware and software updates
Protection

Protection is focused on the growth and implementation of tried-and-true safeguards we’ve developed during our years of experience. Protection supports TechBldrs’ ability to contain the impact of a potential cybersecurity threat. This includes all educational events, security audits and penetration testing, strictly adhering to all federal and state standards, an open line of communication between our client and us, and routine maintenance and upkeep.

Safeguards are developed and customized according to your exact needs and concerns.

Detection

With proper coverage, the odds of a security event occurring are very slim. But when it does, TechBldrs will know about it. We monitor your systems continuously, and any anomalies will be handled urgently using our strictly-managed response process.

We’ve broken down our Detection responsibilities into a timeline that includes:

  • Antivirus installation
  • Periodic security audits
  • Routine updates
  • Closure of security holes
  • In-person consulting and training
  • Computer an system health checks
  • IT and cybersecurity needs reevaluation and plan evolution
Response

Response is aimed at cultivating procedures and systems that allow for swift action once a security threat is detected and identified. Examples of categories within the Response portion of our framework include planning, communications between TechBldrs and our clients, analysis, and improvements.

All security events are categorized as “Low,” “High,” or “Urgent” in accordance with our Threat Hierarchy upon initial alert or occurrence. In 15 minute increments, events can be raised or lowered in alert level depending on what has arisen during the course of the prior 15 minutes.

Recovery

Our goal with Recovery is always to allow you to resume business as quickly as possible in the wake of a technological, physical, or cybersecurity disaster.

When we discuss Recovery, we’re discussing the development and implementation of plans geared towards the restoration of any technological capabilities and services that were impaired due to a cybersecurity event or physical disaster. We use our Restart Disaster Recovery service (or RestartDR for short), a doubled up backup service, to ensure that your future is planned for while we’re taking care of your present.

These are some of the steps we take during our Recovery process:

  • If there is data loss, we restore your company’s data based upon your business resumption planning
  • We lock down which computers or servers can be remotely controlled and accessed
  • Ensure that all proper security settings, programs, and procedures are being followed
  • IT planning and security consulting, including presenting a report about the security event that just occurred


RestartDR

(Restart Disaster Recovery)

The Next Generation of Disaster Recovery and Business Resumption

Disasters happen.

Unexpected hardware failure, physical disaster, accidental mismanagement by an employee, cybersecurity breach- it’s not a matter of “if” your systems will be compromised, but “when.” Your company relies on the day-to-day dependability of your business data. You need a disaster recovery service you can rely on just as much.

TechBldrsRestartDR can get your business back up and running with as little downtime as possible. We’ve created a multi-faceted approach to business resumption and data recovery, keeping in mind all data-loss scenarios.

RestartDR combines:

  • A system-wide backup of all essential data
  • Equipment and software for backups
  • Daily monitoring
  • A complete business resumption plan
  • Disaster assessment and recovery schedule

Learn more about our disaster recovery planning here, and feel free to contact us to discuss how we can immediately start the process of protecting your business.