Multi-Factor Authentication
Did you know that 81% of breaches leverage stolen and/or weak passwords? *Establishing multi-factor authentication (MFA) by sending a second randomly generated pass code to your phone will secure and protect your critical data, from sensitive applications to Microsoft 365, Google Workspace, User Workstations as well as VPN and RDP connections.
Key Features:
- Protect against credential theft
- Achieve regulatory compliance
- Reduce risk of data breaches
Better Protection. Better Security. A Better Business.
* Verizon 2017 Data Breach Investigations Report 10th edition.Security Awareness Training
Did you know that 77% of security professionals rank Awareness Training as the most effective tactic to prevent or block ransomware? *More than ever, employees are the weak link in an organization’s network security. They are frequently exposed to sophisticated phishing and ransomware attacks. Employees need to be trained and remain on their toes with security top of mind. Find out how we can help you manage the continuing problem of social engineering and create a human firewall.
Simulated Phishing Campaigns:
StratusPointIT will create a phishing simulation to test your employee’s awareness to potentially harmful emails, from who opened, clicked, and entered credentials. We will notify the employee that the email was a test and show them the key indicators within the email to watch out for, from incorrect/mis-spelled domain names to hovering over links within the email. In addition, we will provide management with a report of the results.Training Videos and Newsletters:
StratusPointIT will provide access to training videos and newsletters focused on numerous areas for your respective business. From CEO Fraud, Credit Card Security, GDPR, Mobile Device Security, Ransomware, Strong Passwords, PCI compliance, Safe Web Browsing, and much more.* Cybersecurity Insiders & Bitdefender 2017 Ransomware Report.
Advanced Phishing & Spam Protection
Did you know that 66% of malware is via email attachments? *Our offering is a simple approach to email management and security. We provide a comprehensive email protection and continuity product that helps defend against the latest threats, from spear-phishing, ransomware, impersonation and other targeted attacks.
Impersonation Protection:
Our solution provides real-time protection against social engineering attacks like whaling, CEO fraud, or W-2 fraud.URL Protection:
A layered security check is performed on the destination site when users click on a link from an email. In addition, following the initial URL link check, the solution then determines if the link downloads to a file directly and scans for potentially malicious content in the file.Attachment Protection:
Replaces attachments that potentially contain malicious code with a clean, transcribed version. Employees have access to the original file that undergoes a detailed security analysis.* Verizon 2017 Data Breach Investigations Report 10th edition.
DNS Web Filtering
Did you know that email and web are collectively used to deploy 99% of malware-based cyberattacks? *Our DNS filtering service provides an additional layer of protection between an employee and the internet by blacklisting dangerous sites & filtering out unwanted content, in the office or at home. The domain name system (DNS) works like a phone book for the internet. When your employee enters a website, the DNS servers take that input and translate it into the unique internet protocol (IP) address that lets the browser open the desired site. DNS protocols are highly vulnerable to cyberattacks.
By redirecting users’ web traffic through a cloud-based, DNS security solution, businesses can finely tune and enforce web access policies, ensure regulatory compliance, and stop threats at the network’s edge.
* Cisco Annual Cybersecurity Report for 2018.
Patching
Did you know unpatched vulnerabilities are the cause of one in three breaches around the world? *Patch management involves identifying, sourcing, testing, deploying and installing patches for operating systems and key applications in your organization. Patching your workstations and servers ensures the operating system is updated with critical updates. Having an effective patch management policy can help minimize the risk of cyberthreats and business downtime.
Key Benefits:
- Helps prevent data breaches by fixing security vulnerabilities.
- Improve the efficiency and functionality of a system.
- Helps you stay compliant with numerous security frameworks.
* Microsoft Vulnerabilities Report 2021.
Antivirus
Did you know “known” ransomware attacks were up 68% in 2023? *Antivirus is designed to prevent, search for, detect, and remove software viruses, and other malicious software, such as malware and spyware. It will scan files and programs for known malicious signatures. From a security standpoint, antivirus software at a minimum should be implemented as a first line of defense to protecting your systems. The software runs automatically in the background to scan your systems for malicious activity.
* 2024 State of Malware - Malwarebytes.
Managed Detection & Response (MDR)
Did you know 76% of respondents of a recent survey who had been compromised say the attack was a new or unknown zero-day attack? *Managed Detection and Response (MDR) combines Endpoint Detection and Response (EDR) with a 24/7/365 Security Operations Center (SOC). Though an EDR solution provides you the platform to investigate and remediate threats, it still requires human intervention. A MDR solution provides a certified team of security professionals that will provide monitoring, incident response and remediation services to help keep your business safe.
Endpoint Detection and Response
Endpoint Detection and Response (EDR) is a cybersecurity solution that uses Next-Gen Antivirus (NGAV) and also detects and mitigates cyber threats by continuously monitoring endpoint devices and analyzing endpoint data in real time. This solution will provide a platform for internal IT professionals to contain, investigate and remediate compromised systems.
NextGen Anti-virus
Next-Gen Antivirus (NGAV) uses a combination of innovative technologies to prevent known and unknown threats. From known malware to detecting stealthy activities whether endpoints are on or off the network by using artificial intelligence, behavioral detection, and machine learning algorithms. NGAV uses these innovative technologies to stop rapidly evolving threats by looking at the tactics, techniques, and procedures (TTPs) used by adversaries, not just the file signature like traditional (legacy) antivirus solutions.
* Ponemon Institute State of Endpoint Security Risk.
Mobile Device Management (MDM)
Did you know 74% of global IT leaders claim their companies experienced a data breach due to mobile security issues? *MDM enables you to protect and administer all your endpoints from a single platform, from managing user access to applications and device management.
Layers of Security
- Identities: Manages user access to corporate devices and applications.
- Applications: Manage M365 apps and files in OneDrive & SharePoint, from deployment to removal, on corporate and BYOD devices (e.g. iPhone).
- Devices: Ensure devices meet compliance requirements, from ensuring proper passwords to specific security software being deployed.
Common examples:
- Identities: You can put a condition in place that your employees require multi-factor authentication to be able to access your corporate data, and it will not allow them to do so until that MFA criteria has been met.
- Applications: You can mandate the usage of Microsoft Office mobile apps to gain access to corporate data via an employee’s personal iPhone or Android device. If the employee leaves the company or their iPhone/Android device is lost or stolen, you can remotely wipe the device of the Microsoft Office mobile apps.
- Devices: MDM lets you limit access to your corporate data to only devices that your organization manages. By creating a conditional access policy, those devices can be corporate-owned or a BYOD that your organization allows.
* Markets and Markets.
Vulnerability Scan
Did you know unpatched vulnerabilities are the cause of one in three breaches around the world? *Patch management involves identifying, sourcing, testing, deploying and installing patches for operating systems and key applications in your organization. Patching your workstations and servers ensures the operating system is updated with critical updates. Having an effective patch management policy can help minimize the risk of cyberthreats and business downtime.
Key Benefits:
- Helps prevent data breaches by fixing security vulnerabilities.
- Improve the efficiency and functionality of a system.
- Helps you stay compliant with numerous security frameworks.
* Microsoft Vulnerabilities Report 2021.
Firewalls
Did you know “known” ransomware attacks were up 68% in 2023? *Antivirus is designed to prevent, search for, detect, and remove software viruses, and other malicious software, such as malware and spyware. It will scan files and programs for known malicious signatures. From a security standpoint, antivirus software at a minimum should be implemented as a first line of defense to protecting your systems. The software runs automatically in the background to scan your systems for malicious activity.
* 2024 State of Malware - Malwarebytes.
Penetration Testing (PenTest)
Did you know 83% of breaches involved External actors, and the primary motivation for attacks continues to be overwhelmingly financially driven, at 95% of breaches? *
StratusPointIT uses an automated network penetration testing platform that combines the knowledge, methodology, processes, and toolsets of a hacker. To put it in simple terms, the automated application will try to hack your network to test your security.
Types of tests:
Internal Network PenTest: Using a device connected to your internal environment, the PenTest will discover security vulnerabilities present within the internal network environment. These activities simulate that of a malicious attacker.
External Network PenTest: Assuming the role of a malicious attacker from the public Internet, the PenTest will identify security flaws within your external network environment. These flaws can include patching, configuration, and authentication issues.
What is being tested:
- Testing that your organization is effectively restricting unnecessary outbound traffic. Unrestricted outbound access can allow a malicious actor to exfiltrate data from your organization’s environment using traditional methods and unmonitored ports.
- Attempt to upload malicious code onto remote systems in an attempt to test the organization’s end-point anti-malware controls.
- Ability to access confidential and/or sensitive data can be attained.
- Find and validate credentials and determine if they can be used to access privileged information.
Benefits of an automated PenTest:
- Lower Cost: Up to 75% more cost effective compared to a typical PenTest.
- Faster: Finding available security consultants is difficult. The automated test provides flexibility in scheduling.
- Consistency: The automated test reduces human error.
- Robust Reporting: Automated Executive and Technical level reporting.
* Verizon 2023 Data Breach Investigations Report.
Security Information & Event Management (SIEM)
Did you know 75% of business decision makers and 83% of IT decision makers are concerned their organization will be the target of a cybersecurity attack in the next 6 months? *
Monitor and safeguard your data by implementing a SIEM.
SIEM combines security information management (SIM) and security event management (SEM). Security Information and Event Management (SIEM) offers real-time monitoring and analysis of events as well as tracking and logging of security data for compliance or auditing purposes.
SIEM is a type of software that is used to detect, prevent, and help resolve cybersecurity incidents. Logs and flow data from a wide range of sources such as applications, assets, cloud environments, and networks is collected, stored and analyzed in real-time.
Key Features:
- Collects log and event data from an organization’s network devices, firewalls, wireless access points, and more.
- Detecting threats on your network by continuous security monitoring of your network’s logs
- Established detection and response procedures to reduce or eliminate emerging threats.
- Solve regulatory and compliance requirements (HIPAA, NIST, CSF, CMMC).
* The State of SMB Cybersecurity in 2021 survey conducted by Vanson Bourne and commissioned by ConnectWise.
What our customers say
If you are pondering on should I hire or outsource my IT department look no further than ComputerSupport.com. Here is a company that will keep your business technology running smoothly and continues to bring new opportunities to your business. We are extremely satisfied with ComputerSupport.com and all their employees, this has been the best decision and direction our company has gone, I only wish we did it years ago. They are very professional, responsive and give you everything you need to improve your business.
The time had finally come for our accounting firm to overhaul our operating system & network. Though a seemingly daunting task to us, ComputerSupport.com seamlessly integrated our current software with the new system with minimal down time. Couple this with knowledgeable & responsive support makes ComputerSupport.com the right choice for us.
We chose Computersupport.com in October 2010 as our outsourced information technology provider. We were looking for a company that would serve as a true business partner with us as we continue to grow our business. In addition to replacing our front office system we moved our headquarters location last year. The team at ComputerSupport served as a tremendous resource as we selected a new internet service provider, new phone system provider and moved our servers to a new location. They have provided consistently good support and have become a trusted advisor.
We engaged ComputerSupport.com to help us ensure our Amazon Web Service deployment was always available and properly protected. The ComputerSupport.com team helped us understand and overcome the risks, and showed us best practices and cost savings that we took advantage of. We are happy with the result.
Computersupport.com was selected as our IT Service Provider offering a secure, cost effective and simple solution to our complex IT needs. The 100% cloud based solution we chose is a perfect fit for our entire team. It provides safe and fast access to all company data and email regardless of location.
As a financial firm we are required to adhere to strict compliance rules and regulations with a focus on data/email archiving, protection and retention. Computersupport.com provided us a solution that met all those requirements and offered the peace of mind that our firm was looking for.
Computersupport.com was able to offer SCS Energy an extremely cost-effective and functional set of solutions to our rapidly changing Information Technology needs. We have been extremely pleased with the implementation process for our ITAnyWhere Cloud and Egnyte systems and look forward to continuing our long-standing successful working relationship with Computersupport.com
Since switching to ComputerSupport.com outsourcing services about 2 years ago, my team was able to realize the expertise and agility of a true outsourced partner to accomplish our projects faster and get the right level of support when needed.
The decision to outsource our helpdesk and network management with ComputerSupport.com has been one of the largest technology victories for SCA this year. Having you team supporting our 200 users and coast to coast operation has allowed me to sleep better at night. Your assistance in opening two new regional offices as well as completing our nationwide MPLS network made the projects feel easy.
Other than the network and server management, which is huge, having our own full time help desk resource on site at our main office as well as your ability to get hands on help into any of our remote locations from New Hampshire to Alaska has been key to providing the support our uses have needed and deserve.
We outsourced the business of running our network to ComputerSupport.com. The wide variety of expertise they bring to our company not only in running the existing network but in the telecom area, planning for growth and budgeting has been a tremendous asset. Our company is no longer reacting to adverse network issues; instead we are in a proactive mode of operations. I’m very pleased with our decision to outsource to ComputerSupport.com.
Computer Support did a great job helping us relocate. Our staff was up in running this morning without a hitch. Farkhad was a pleasure to work with and smoothly handled any of our many requests during the start-up. Liam planned the relocation project very well. The entire Computer Support team did a great job!
ComputerSupport.com took over managing our IT and migrated our insurance firm to the ITAnyWhere Cloud platform. This has enabled us save money by not having to maintain on-premise hardware, and allowed my agents to work easily from anywhere. As a senior executive at the organization, ComputerSupport.com removed the IT headaches completely, and allowed me and my team to focus on my business. I would recommend ITAnyWhere Cloud to other firms in my industry.