What is Cybersecurity?
According to Techopedia (https://www.techopedia.com/definition/24747/cybersecurity) Cybersecurity refers to preventative methods used to protect information from being stolen, compromised or attacked. It requires an understanding of potential information threats, such as viruses and other malicious code. Cybersecurity strategies include identity management, risk management and incident management. Cybersecurity is a very broad category which encompasses numerous hardware and software technologies, and can be applied on any level, including personal, corporate or governmental devices or networks. Passwords are a cybersecurity tool that people encounter nearly every day. Other common cybersecurity tools include:
- Anti-virus/anti-malware software
- Software patches
- Two-factor authentication
A cybersecurity plan is critical for any company with highly sensitive information. Many companies now appoint a chief security officer (CSO) or chief information security officer (CISO) to oversee their cybersecurity.
What’s the Deal?
Many businesses have ignored cybersecurity for far too long. Not knowing or not admitting that you have a cybersecurity problem does not make it go away, it just makes it worse. The COVID-19 Pandemic and work from home policies have now brought these threats into focus.
From now until June 30th Automation Concepts is offering businesses in our service area (50 miles from North Attleboro, MA) a free cybersecurity analysis. This type of analysis typically costs between $3,000 to $5,000 depending on the size of your organization. We can act as your virtual CISO.
What We Will Provide.
Automation Concepts will provide your business with a cybersecurity analysis report using the ConnectWise Identify Tool, which is based on the NIST (National Institute of Standards and Technology) Cybersecurity Framework.
Automation Concepts will provide an External Network Security Scan using the industry leading Rapidfires Tools Network Detective.
Automation Concepts will provide a report showing any credentials associated with your domain that are found for sale on the Dark Web using industry leading Kaseya’s ID Agent Dark Web Monitoring Tool.
What is Required from You?
A senior executive, or owner, of your company must spend about 30 minutes on a call with Automation Concepts reviewing the questions in the ConnectWise Identify module relevant to your operations and how those relate to the NIST Cybersecurity Framework.
An authorized person must sign a letter giving us permission to scan your network, this is required by law.
The senior executive, or owner, that participated above must spend 15 to 30 minutes on a follow-up phone call to review our findings.