Cybersecurity
- Recurring IT Security Audits, Internal and External Vulnerability Tests
- 3rd Party Network Penetration Tests
- Proactive Workstation, Network and Server Monitoring, Alerts and Remediation
- Endpoint Protection and Next Generation Antivirus
- Web Application Firewalls (WAF)
- Hardware Firewall with Unified Threat Management (UTM) and industry standard rules
- Web and Content Filtering
- Email SPAM filtering, URL Filtering, Attachment Sandboxing and Data Loss Protection (DLP)
- Wired And Wireless Network Security Standards, Protocols and Policy
- Bring Your Own Device (BYOD) Policies
- Data and Voice Redundancy and Failover Solutions
- Image and File based Backups
- Disaster Recovery and Business Continuity Solutions when all else fails
- Hardening of servers using the latest CIS Benchmark recommendations