A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS
Every day McCann Security helps business decision-makers and stakeholders solve cybersecurity issues and protect their critical data and infrastructure. Our operations began during the mass adoption of electronic devices and digitally stored information, and we ve continued to lead the cyber-security industry through the evolution of mainframes, desktops and laptops, and now mobile devices and cloud storage. All along the way, our veteran team has been armed with the latest technology, and backed by decades of professional experience in both public law enforcement and private security. The threat we face is very real: according to a 2013 study by Symantec, 61% of all cyberattacks target small and medium businesses (SMBs), with about 30% of such businesses targeted by at least one spear-phishing email that year 1. The following year, Advisen declared cyber exposure of SMBs a digital pandemic. 2 More and more businesses are now responding, with a 7% increase (15% to 22%) in small entities having plans to raise their cybersecurity budgets between 2013 and 2014. 3 While growing attention to cyber-security might be a recent development, McCann certainly isn t new to the practice. Whether on a mobile device, a desktop, or other digital tool, the ever-expanding mass of electronically stored information requires reasonable and measured levels of security that are agile and adaptable to the risk and needs of each client, as well as their business or home. McCann s specialized, responsive professionals are dedicated to delivering constant vigilance above and beyond what traditional in-house IT staff might offer, by constantly monitoring cyber activities and anticipating needs even before potential threats can strike. 1 http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v18_2012_21291018.en-us.pdf 2 http://www.advisenltd.com/wp-content/uploads/cyber-exposures-small-mid-size-businesses-white-paper-2014-10-14.pdf 3 http://www.csid.com/wp-content/uploads/2014/06/csid_whitepaper_smb2014_final.pdf MCCANN S FOUR STEP PLAN FOR CYBER SECURITY STEP 2 AUDIT STEP 1 ASSESSMENT
3 STEP ONE ASSESSMENT McCann Security professionals take proactive steps to mitigate ever-changing cyber risks, and can respond if an incident occurs serving as single provider from prevention through incident response. The first step toward securing your system is a licensed McCann Security IT expert interviewing existing service providers and staff involved in the daily operation of your digital infrastructure. This may include current staff, outsourced IT providers, and other stakeholders in the IT configurations that operate within your business or home. 61%of all cyberattacks target small and medium businesses (SMBs), with 30% about of such businesses targeted by at least one spear-phishing email that year. 1 STEP 3 IMPLEMENTATION STEP 4 MONITORING & RESPONSE
STEP TWO AUDIT Following the preliminary assessment, McCann will generate a formal report and audit of your present cybersecurity infrastructure. Among the provided data are the results of an internal and external vulnerability scan by the Nessus Scanner, an industry-recognized leading inspection product. The Nessus Scanner searches your system for the presence of known cyber threats, holes, and other potential vulnerabilities in your digital framework. STEP 1 ASSESSMENT STEP 2 AUDIT
Captive Portal 5 STEP THREE IMPLEMENTATION The results of the assessment and audit are exhaustively examined and reviewed to evaluate security hardware, as well as to address known spyware or malware, and vulnerabilities in the internal systems, or external facing connections to the Internet. Based on the outcome of these procedures, a McCann Cyber-security professional furnishes a comprehensive list of recommendations for improving your cyber-security processes, and outlines the costs involved to help not only mitigate your potential risks, but also meet your unique budget. This may include current staff, outsourced IT providers, and other stakeholders in the IT configurations that operate within your business or home. ACCORDING TO VERIZON S 2014 DATA BREACH INVESTIGATION REPORT 65% OF SMB DECISION MAKERS ARE NOW MORE CONCERNED ABOUT CYBERCRIME THAN THEY WERE 12 MONTHS AGO 57% STEP 3 IMPLEMENTATION OF SMB DECISION MAKERS SURVEYED PLAN TO BOOST IT SECURITY SPENDING FOR THEIR BUSINESSES IN 2015 STEP 4 Well-priced desktop network appliance saves energy and space. Well-priced desktop network appliance saves energy and space. Plug-and-play setup makes deployment easy for even less technical users. Plug-and-play setup makes deployment easy for even less technical users. Choose between Free and Complete to suit your needs and budget. Choose between Free and Complete to suit your needs and budget. Appliances are sold with an annual software license. Appliances are sold with an annual software license. Details Details The Untangle u50 NG Firewall Appliance is designed to give you a complete, footprint and silent operation make it the perfect choice for a desktop you want at the price you need. The Untangle u50 NG Firewall Appliance is designed to give you a complete, footprint and silent operation make it the perfect choice for a desktop you want at the price you need. Features Features NG Firewall Complete includes all of our paid NG Firewall applications: Web Filter HTTPS Inspector Decrypt HTTPS to allow other apps to process the datastream. Live Support For easy resolution of any technical Policy Manager Create web usage restrictions, such as teacher vs student. Branding Manager Customize "block" screens with your own messages and logo. IPsec VPN Securely connect your network to others. Application Control Control any application or protocol with a checkbox or use the Integrated Rules Engine to leverage other Untangle apps for complex rules. Hardware Example Web Cache Save time and money by caching frequently accessed items. Bandwidth Control Virus Blocker Prevent infections from reaching your network. Spam Blocker Stop spam before it hits your mail server. Directory Connector Enforce restrictions and view reports by Active Directory user name. Phish Blocker Intrusion Prevention Firewall OpenVPN Reports Captive Portal DESCRIPTION AMOUNT Hardware $ Cost Initial Assessment Cost $ NG Firewall Complete includes all of our paid NG Firewall applications: Web Filter HTTPS Inspector Decrypt HTTPS to allow other apps to process the datastream. Live Support For easy resolution of any technical Policy Manager Create web usage restrictions, such as teacher vs student. Branding Manager Customize "block" screens with your own messages and logo. IPsec VPN Securely connect your network to others. Application Control Control any application or protocol with a checkbox or use the Integrated Rules Engine to leverage other Untangle apps for complex rules. MONITORING & RESPONSE Installation $ McCann Oversight $ Items Listed To In IVA/EVA $ Quarterly First to be Conducted $ Annual Software License Web Cache Save time and money by caching frequently accessed items. Bandwidth Control If Onsite Required or Requested Prior to Quarterly Visit Cost Virus Blocker Prevent infections from reaching your network. Spam Blocker Stop spam before it hits your mail server. Directory Connector Enforce restrictions and view reports by Active Directory user name. Phish Blocker Intrusion Prevention Firewall OpenVPN Reports Hardware Example Hourly $ 255.00 3 Price Exam $ 3
STEP FOUR CONTINUED MONITORING & RESPONSE Ongoing vigilance isn t just something that s done after your new security plan s been implemented instead, it s actually part of the plan. McCann Security s team of experienced experts is committed to partnering with you to keep your digital operations running safely and smoothly, and to ensure that you re always prepared to avoid and overcome the latest emerging cyber threats. A PROVEN THREAT A TRUSTED SOLUTION STEP 1 ASSESSMENT STEP 2 AUDIT STEP 3 IMPLEMENTATION STEP 4 MONITORING & RESPONSE
FREQUENTLY ASKED QUESTIONS (FAQs) Is McCann Security licensed by the State of Texas Department of Public Safety (DPS) Private Security Bureau, and why is this important? McCann s cyber-security professionals have all undergone an FBI-level background check completed and enforced by DPS, and are licensed by the DPS Private Security Bureau providing documented confirmation of the credibility of our operations. DPS licensure means that Texas courts will allow admission of evidence produced and reports generated by McCann personnel if legal proceedings must be initiated. 7 Can McCann Security provide references for cyber intrusion and detection experiences, and for data leak and digital forensics? Why is this important? What resources can McCann Security deploy in the event of a cyber-security breach? I have less than 100 employees, how do I improve cyber-security for my business? I do a lot of work from my home, how can I keep my data secure there also? McCann s professionals are experienced in Cyber Intrusion/Detection, Data Leak Prevention, and Digital Forensic Investigations. Our qualification document includes a current list of references, as well as detailed comparative case experiences. This is a specialization, and our extensive proficiency as a firm increases the likelihood of successful outcomes. Regardless of the level of prevention, hackings and other security breakdowns can and do occur, and data is stolen. When this occurs digital events need to be investigated as requested and evidence can either go undiscovered or be rendered inadmissible if the work is performed by an unqualified or unlicensed technician. McCann operates its own digital forensic lab staffed by licensed, full-time computer forensic investigators and technicians. Our facilities feature equipment suited for handling today s mobile, desktop, and cloud-based forensic recovery and research requirements. McCann s simple yet effective four-step process is ideal for addressing the cyber-security concerns of your small business: it includes a preliminary review of what your organization currently has in place; a scan of your network to detect malware, spyware, and other security-related issues such as missing patches; a user-friendly report and suggestions for how to reduce your internal and external vulnerabilities; and continuous monitoring and regular audits to ensure your network is prepared to face evolving cyber threats. The assessment can be done during normal hours in less than a day, and won t interfere with your regular operations. Home networks and devices are often a preferred target of hackers who know that the residential defenses are tend to be less robust, while the potential data yield is equally high. Many professionals bring home critical business information daily on computers, tablets, and mobile phones, and store critical or highly sensitive personal information such as financial logins and figures on hardware that accesses the Internet via residential Internet providers. McCann s Security s process for safeguarding your home s digital resources is similar in structure and effectiveness to that for your business, except that it typically involves fewer devices and less time.
TO GET STARTED CONTACT MCCANN INVESTIGATIONS HOUSTON NATIONAL DISPATCH CENTER 800.713.7670 Take control of your organization s cyber-security by putting McCann Security s dedicated team and three decades of proven experience on the front line! MCCANN SECURITY SYSTEMS 10375 Richmond, Suite 260 Houston, TX 77042 mccann-security.com MCCANN INVESTIGATIONS ARE ACCREDITED MEMBERS OF MCCANN INVESTIGATIONS ARE CERTIFIED BY Texas License: C15690 New York License: 11000120404 New Jersey License: 5271