OUR CYBERSECURITY PLAN
It’s a simple question with a sometimes not-so-simple answer.
40% of small to medium-sized businesses that use the internet will have their network accessed by a cybercriminal, and more than 50% won’t even know that they were attacked. (Source: Gartner Group)
Stolen client information
Stolen accounting data and monetary loss
…and that’s just the beginning!
The cybersecurity landscape is always evolving, so you need a cybersecurity plan that evolves with it. TechBldrs has developed PentaGuard as a comprehensive framework to ensure that you’re protected, and that in the event that anything were to happen you can resume business as quickly as possible.
PentaGuard is made up of five core areas that work together to tackle even the nastiest cybersecurity threats head-on.
These are the five sections of PentaGuard:
We’ll break them down for you so you can feel confident in the service we provide.
You can’t fix a problem if you don’t know it exists. Identification centers around the development of an organizational understanding of the current cybersecurity risks to your systems, assets, data, and capabilities. Recognition of possible dangers enables your company to focus and prioritize your efforts in a way that is consistent with your developed risk management strategy.
We’ll help you develop an understanding of the current cybersecurity risks your company faces, which will allow you to focus and prioritize during the implementation of PentaGuard.
During the Identification process, TechBldrs assesses:
Your current data backup and recovery system
Your company’s remote access capabilities
The current level of employee cybersecurity education
Company password and security policies
If you have an email SPAM filter, antivirus, and/or website blocker in place
How you handle hardware and software updates
Protection is focused on the growth and implementation of tried-and-true safeguards we’ve developed during our years of experience. Protection supports TechBldrs’ ability to contain the impact of a potential cybersecurity threat. This includes all educational events, security audits and penetration testing, strictly adhering to all federal and state standards, an open line of communication between our client and us, and routine maintenance and upkeep.
Safeguards are developed and customized according to your exact needs and concerns.
With proper coverage, the odds of a security event occurring are very slim. But when it does, TechBldrs will know about it. We monitor your systems continuously, and any anomalies will be handled urgently using our strictly-managed response process.
We’ve broken down our Detection responsibilities into a timeline that includes:
Periodic security audits
Closure of security holes
In-person consulting and training
Computer and system health checks
IT and cybersecurity needs reevaluation and plan evolution
Response is aimed at cultivating procedures and systems that allow for swift action once a security threat is detected and identified. Examples of categories within the Response portion of our framework include planning, communications between TechBldrs and our clients, analysis, and improvements.
All security events are categorized as “Low,” “High,” or “Urgent” in accordance with our Threat Hierarchy upon initial alert or occurrence. In 15 minute increments, events can be raised or lowered in alert level depending on what has arisen during the course of the prior 15 minutes.
Our goal with Recovery is always to allow you to resume business as quickly as possible in the wake of a technological, physical, or cybersecurity disaster.
When we discuss Recovery, we’re discussing the development and implementation of plans geared towards the restoration of any technological capabilities and services that were impaired due to a cybersecurity event or physical disaster. We use our Restart Disaster Recovery service (or RestartDR for short), a doubled up backup service, to ensure that your future is planned for while we’re taking care of your present.
These are some of the steps we take during our Recovery process:
If there is data loss, we restore your company’s data based upon your business resumption planning
We lock down which computers or servers can be remotely controlled and accessed
Ensure that all proper security settings, programs, and procedures are being followed
IT planning and security consulting, including presenting a report about the security event that just occurred
Unexpected hardware failure, physical disaster, accidental mismanagement by an employee, cybersecurity breach- it’s not a matter of “if” your systems will be compromised, but “when.” Your company relies on the day-to-day dependability of your business data. You need a disaster recovery service you can rely on just as much.
TechBldrs‘ RestartDR can get your business back up and running with as little downtime as possible. We’ve created a multi-faceted approach to business resumption and data recovery, keeping in mind all data-loss scenarios.
A system-wide backup of all essential data
Equipment and software for backups
A complete business resumption plan
Disaster assessment and recovery schedule
Learn more about our disaster recovery planning here, and feel free to contact us to discuss how we can immediately start the process of protecting your business.
© 2021Techbldrs. All rights reserved