Login


SECURITY - YOUR vulnerabilities - OUR knowledge and experience...

There are some really nasty people out there in the world, who's motivation and values are simply different than yours. Maybe vastly different...

They want what you've got, and they couldn't care less if it hurts you for them to take it. They could be just some random hacker, or thief, or they could be working for your competitor. Statistically speaking, it's sad to say - they are very likely to be an employee, or ex-employee, in which case - they actually may care if they hurt you - it's their goal...

We really don't want to be a "fear-monger" about these things. That's not the way we are. We just have had too much experience - both protecting, and cleaning up... Unfortunately, we've seen some pretty nasty things go down, and we've been called in, after the fact - to stop breeches, do damage control, and assess the losses... It's heartbreaking.

We much prefer the protecting part. It should go without saying, that it's always better to have prepared for these things ahead of time. Preparation typically involves:
  • defining what "secure" means for each organization,
  • setting Policies, which are simply business decisions regarding what and what should not be secure
  • defining Procedures to support the Policies, which explain the correct methods of making the Policy happen,
  • implementing those Policies through the technology infrastructure, and...
  • sometimes a little training helps reinforce the new Policies and Procedures...

As far as how we implement security in a business goes, we have some very well-proven techniques, and a lot of good experience. One of the best things a business can do is to move core business services to a secure datacenter environment, like our Hosted Solutions. Another is to have a really good, professional-grade firewall, and our favorites are those from a German security for small businesses and branch offices is the Astaro ASG 120, a phenomenal value in a comprehensive security gateway.

The best way for us to assist you in creating a secure environment is to have us assess your current situation. We can talk about your situation. If you already have a Security Policy in place, and want to know how good it is, we can perform a comprehensive analysis including a penetration test or even more "human engineering" type of analysis. If you don't have security in place that is even worth our beating on, then we really need to talk - immediately, if not sooner...