In days long past, it was the standard to install a reputable anti-virus program and that was considered appropriate protection. Today, anti-virus alone does not begin to provide acceptable protection for a small business. At Technology Concepts, we continually research the latest and greatest threats and provide tools and policies to help keep your network secure. Here are a few of the ways we allow our clients to sleep more comfortably at night.
- Anti-virus – not enough, but still required.
- Ransomware Protection – Since no AV catches everything, our tools are designed to look for indicators of ransomware, kill it, and restore encrypted files back to their original state, all without impacting your work. It then notifies us of the malicious activity so we can follow up.
- Managed Detection & Response (MDR) – 24x7x365 monitoring for malicious activity. If needed, the issue will be assigned to a skilled security professional who will remotely identify and resolve the issue and inform us if any follow-up is required.
- Admin Protection – Without Administrator access, the vast majority of malicious actors can’t cause you harm. Our tools allow you to request approval any time Admin access is needed, so we can all be sure it is for a legitimate reason.
- Multi-Factor Authentication (MFA) – MFA is no longer just a good idea. It is an absolute requirement for even reasonable security. We’ll work with you to setup MFA for your Microsoft accounts and other applications you may use.
- Managing Strong Passwords – Managing passwords can be one of the most challenging and frustrating processes. We provide you a secure password manager to help make using strong passwords and MFA much easier.
- Spam Filtering – To reduce the risk of malicious emails, it is critical to scan and quarantine items that might cause you harm.
- Updates – When analyzing the cause for breaches, far too often the fix has already been released, but not yet installed. We automate the process to ensure your computers’ Windows O/S and drivers* are updated timely.
- Is it Really You? – Our tools allow us to quickly send you a code to authenticate we’re truly speaking to who you claim to be.
- Security Training – Our training platform emails each staff member a simple test each month to educate your team and keep security at the forefront. We also test their propensity to be fooled by a phishing email and require additional training if they fail.
- Backups – While all data files should be saved in your common repository, we know that doesn’t always happen. We backup your servers (if you have) and also selected workstations. In addition, we can get you up and running in a virtual environment, in the event of a crisis.
*Drivers are updated for supported devices.