Consulting Services

WHAT WE DO:

Assessments - We evaluate your business using our small business framework and report the results so you can better understand your cybersecurity risk.

Assessments - We evaluate your business using our small business framework and report the results so you can better understand your cybersecurity risk.

Technical Configuration & Implementation - Wordpress sites, custom websites, computers, mobile phones, wireless access points, routers, switches, servers, and more. We can help you securely configure and/or implement.

Technical Configuration & Implementation - Wordpress sites, custom websites, computers, mobile phones, wireless access points, routers, switches, servers, and more. We can help you securely configure and/or implement.

Audits - It is good practice to inspect what you expect. Our audits help you understand the state of your IT security and identify gaps between what you think is occurring and what really is occurring.

Audits - It is good practice to inspect what you expect. Our audits help you understand the state of your IT security and identify gaps between what you think is occurring and what really is occurring.

Incident Response & Recovery - Think you’ve had a security incident? Not sure what to do? We can help you respond and recover as quickly and painlessly as possible.

Incident Response & Recovery - Think you’ve had a security incident? Not sure what to do? We can help you respond and recover as quickly and painlessly as possible.

Legal & Compliance - HIPAA HITECH Information Security Regulations, Payment Card Industry (PCI) Data Security Standard, Gramm-Leach-Bliley Information Security Regulations, and more. We can help audit and/or implement.

Legal & Compliance - HIPAA HITECH Information Security Regulations, Payment Card Industry (PCI) Data Security Standard, Gramm-Leach-Bliley Information Security Regulations, and more. We can help audit and/or implement.

Policies, Processes, & Procedures - We audit what you have and/or help you draft critical organizational documents such as an Information Systems Security Plan, Disaster Recovery / Business Continuity Plan, and more.

Policies, Processes, & Procedures - We audit what you have and/or help you draft critical organizational documents such as an Information Systems Security Plan, Disaster Recovery / Business Continuity Plan, and more.

Training & Awareness - Onsite, practical training that will improve your cyber security and lower your risk of a data breach. Customize the training to your business or choose from one of our standard training packages. Many of our classes also qualify for continuing education credit.

Training & Awareness - Onsite, practical training that will improve your cyber security and lower your risk of a data breach. Customize the training to your business or choose from one of our standard training packages. Many of our classes also qualify for continuing education credit.

 
 

WHAT YOU GET: Agreed upon deliverable(s) at or before agreed upon time.

PRICE: Per project or hourly rate depending on the type of work and your preference.