IT Security Assessment

IT Security Assessment | Secure Solutions Technology Partners

Contact Secure Solutions Technology today for your Free Cyber Security Assessment!

Cyber experts have described ransomware as the "Epidemic of our time."  Here are just a few facts to consider as you think about Cyber Security for your business:

  • Worldwide damage costs are expected to exceed $10.5 Trillion by 2025

  • According to a report by Small Business Trends based on research by Cybereason, 25% of companies that experienced a ransomware attack are closed.

  • That same article reported that 66% of businesses faced a significant revenue loss due to a ransomware attack, and

  • 80% of organizations that paid ransom experienced another attack

So how do you protect your business?  Start with a complete IT Security Assessment to understand where there are gaps and the steps you need to take to improve.

In 2018 the National Institute of Standards and Technology established a Core Framework for improving cyber security.  They identified 5 key areas of focus to improve any cyber security plan.

NIST Standard - IT Security Assessment

At Secure Solutions Technology, we have built our Cyber Security Platform around the NIST standard, and it requires a complete multi-layered approach centered on each of the 5 key areas of focus.

Cyber Security Layers - IT Security Assessment

Level 1

Starting with perimeter security, we look at how your business operates, i.e. retail, Doctor or Dentist, industrial parts broker, etc.  Each business has different needs.  If you expect to have walk-in traffic than you obviously need to keep your doors open during business hours.  If you don't have walk-in traffic it may make sense to keep your door locked.  In addition to the office access we evaluate the current network and hardware security within your office.

Level 2

Next, we look at firewalls, advanced security gateways, wireless networks, guest networks, business application portals, remote workers and other factors that impact the necessity to access your network from outside the building.  We can develop a comprehensive plan to ensure your business operates as needed but remains as secure at the same time.

Level 3

Advanced email security is a critical part of any cyber security plan.  94% of all malware that infects businesses comes from email and/or employee behavior.  Advanced email security provides protection from incoming emails with embedded viruses or malware.  It also protects against employees clicking on links to malicious sites.

Level 4

Next, we look at advanced endpoint protection or anti-virus.  Unlike typical anti-virus products, advanced endpoint protection uses artificial intelligence to monitor activity in core operating system of your workstations, servers and laptops.  It looks for suspicious activity, tracks it and if needed can rollback any activity and isolate the malware to eliminate it from your hardware.  It offers the most comprehensive ransomware protection on the market.

Level 5

Along with email security, we look at employee training and awareness.  Keeping employees aware of the risks and constantly reinforcing it with training is a key step in improving your security.  In addition, if you have cyber insurance for your business, training your employees and providing proof of testing may help to reduce your cost of insurance.

Level 6

The last layer of defense for your business is a business continuity and disaster recovery (BCDR) solution.  It's not just data backup.  With BCDR, you're not only backing up your data, but you're also making sure the data works when needed with planned disaster recovery drills.  Don't think you need to worry about data loss!  Think again.

  • In use, over 140,000 hard drives fail each week
  • 60% of backups are incomplete, and
  • 50% of backups fail at the time of restoration.

So, if your backup doesn't include disaster recovery and you lose your data, you may be praying that you're not in the wrong 50%.

Most importantly, you want a data backup solution to virtualize your backup into a functioning server.  If your server is attacked and disabled, or you lose your data due to hardware, software, or human error, having the ability to virtualize your server means you're back up and running in a matter of minutes rather than days or weeks.  In other words, it is business as usual.

Finally, surrounding all of this, we evaluate both your proactive and reactive response capabilities.  Proactive will include policy management, i.e., password policies, policies protecting against shadow IT, and 2-factor authentication.  Reactive responses mean your systems are monitored for potential issues.  This allows for faster response and remote problem mitigation.

For more information or to schedule your own Security Assessment, call us today at 704.754.8484 or email us at

Most of you probably did not know that today is National Password Day.  To help...
  There are a Lot of Choices Are you struggling with your small business IT? ...
  In This Week’s News By now, you have probably heard about the most recent...
  Secure Solutions Technology, one of the fastest growing IT solution providers in central NC...
  What is a VPN? VPN stands for Virtual Private Network.  In simplest terms, a...
As our country continues to adjust to our new “normal” circumstances, it is important for...
What is a zero-day attack? Viruses and malware are written to take advantage of inadvertent...
It seems like we hear about major corporate breaches every day.  Whether it’s Equifax, Target,...
What is two-factor authentication (2FA)? 2FA is an added layer of protection for your online...
Today the average American spends 24 hours a week online. Either on their mobile devices...