A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS

Similar documents
Internet threats: steps to security for your small business

Cyber Security. John Leek Chief Strategist

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

OVERVIEW. Enterprise Security Solutions

Advantages of Managed Security Services

2012 Endpoint Security Best Practices Survey

Managed Security Services for Data

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

Secure Your Mobile Workplace

Global IT Security Risks

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

The Attacker s Target: The Small Business

Building a Business Case:

How To Protect Your Data From Being Stolen

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

How To Protect Your Network From Attack From A Network Security Threat

MANAGED SECURITY SERVICES (MSS)

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

McAfee Total Protection Reduce the Complexity of Managing Security

Endpoint Protection Small Business Edition 2013?

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Closing the Security Gap

How To Protect Your Cloud From Attack

Managed Services. Business Intelligence Solutions

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

2012 NCSA / Symantec. National Small Business Study

Bellevue University Cybersecurity Programs & Courses

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Defending Against Data Beaches: Internal Controls for Cybersecurity

Enterprise Computing Solutions

Best Practices for Outdoor Wireless Security

How To Secure Your System From Cyber Attacks

KEY TRENDS AND DRIVERS OF SECURITY

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

Next Gen Firewall and UTM Buyers Guide

SIZE DOESN T MATTER IN CYBERSECURITY

Intelligent, Scalable Web Security

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

AVeS Cloud Security powered by SYMANTEC TM

Cyber Security Solutions:

Stable and Secure Network Infrastructure Benchmarks

Is your business secure in a hosted world?

overview Enterprise Security Solutions

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

Defensible Strategy To. Cyber Incident Response

Five keys to a more secure data environment

Case Study: Hiring a licensed Security Provider

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

Top tips for improved network security

PCI DSS Top 10 Reports March 2011

RETHINKING CYBER SECURITY Changing the Business Conversation

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

overview Enterprise Security Solutions

DAMAGE CONTROL: THE COST OF SECURITY BREACHES IT SECURITY RISKS SPECIAL REPORT SERIES

MANAGED SECURITY SERVICES (MSS)

Simplify Your Network Security with All-In-One Unified Threat Management

Nine Steps to Smart Security for Small Businesses

McAfee Security Architectures for the Public Sector

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Cisco Security Optimization Service

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

Proactive IT Solutions More Reliable Networks Are Our Business

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

Non-Geeks Guide to. Network Threat Prevention

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Endpoint protection for physical and virtual desktops

Microsoft Windows Intune: Cloud-based solution

Jort Kollerie SonicWALL

Security for NG9-1-1 SYSTEMS

Transcription:

A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS

Every day McCann Security helps business decision-makers and stakeholders solve cybersecurity issues and protect their critical data and infrastructure. Our operations began during the mass adoption of electronic devices and digitally stored information, and we ve continued to lead the cyber-security industry through the evolution of mainframes, desktops and laptops, and now mobile devices and cloud storage. All along the way, our veteran team has been armed with the latest technology, and backed by decades of professional experience in both public law enforcement and private security. The threat we face is very real: according to a 2013 study by Symantec, 61% of all cyberattacks target small and medium businesses (SMBs), with about 30% of such businesses targeted by at least one spear-phishing email that year 1. The following year, Advisen declared cyber exposure of SMBs a digital pandemic. 2 More and more businesses are now responding, with a 7% increase (15% to 22%) in small entities having plans to raise their cybersecurity budgets between 2013 and 2014. 3 While growing attention to cyber-security might be a recent development, McCann certainly isn t new to the practice. Whether on a mobile device, a desktop, or other digital tool, the ever-expanding mass of electronically stored information requires reasonable and measured levels of security that are agile and adaptable to the risk and needs of each client, as well as their business or home. McCann s specialized, responsive professionals are dedicated to delivering constant vigilance above and beyond what traditional in-house IT staff might offer, by constantly monitoring cyber activities and anticipating needs even before potential threats can strike. 1 http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v18_2012_21291018.en-us.pdf 2 http://www.advisenltd.com/wp-content/uploads/cyber-exposures-small-mid-size-businesses-white-paper-2014-10-14.pdf 3 http://www.csid.com/wp-content/uploads/2014/06/csid_whitepaper_smb2014_final.pdf MCCANN S FOUR STEP PLAN FOR CYBER SECURITY STEP 2 AUDIT STEP 1 ASSESSMENT

3 STEP ONE ASSESSMENT McCann Security professionals take proactive steps to mitigate ever-changing cyber risks, and can respond if an incident occurs serving as single provider from prevention through incident response. The first step toward securing your system is a licensed McCann Security IT expert interviewing existing service providers and staff involved in the daily operation of your digital infrastructure. This may include current staff, outsourced IT providers, and other stakeholders in the IT configurations that operate within your business or home. 61%of all cyberattacks target small and medium businesses (SMBs), with 30% about of such businesses targeted by at least one spear-phishing email that year. 1 STEP 3 IMPLEMENTATION STEP 4 MONITORING & RESPONSE

STEP TWO AUDIT Following the preliminary assessment, McCann will generate a formal report and audit of your present cybersecurity infrastructure. Among the provided data are the results of an internal and external vulnerability scan by the Nessus Scanner, an industry-recognized leading inspection product. The Nessus Scanner searches your system for the presence of known cyber threats, holes, and other potential vulnerabilities in your digital framework. STEP 1 ASSESSMENT STEP 2 AUDIT

Captive Portal 5 STEP THREE IMPLEMENTATION The results of the assessment and audit are exhaustively examined and reviewed to evaluate security hardware, as well as to address known spyware or malware, and vulnerabilities in the internal systems, or external facing connections to the Internet. Based on the outcome of these procedures, a McCann Cyber-security professional furnishes a comprehensive list of recommendations for improving your cyber-security processes, and outlines the costs involved to help not only mitigate your potential risks, but also meet your unique budget. This may include current staff, outsourced IT providers, and other stakeholders in the IT configurations that operate within your business or home. ACCORDING TO VERIZON S 2014 DATA BREACH INVESTIGATION REPORT 65% OF SMB DECISION MAKERS ARE NOW MORE CONCERNED ABOUT CYBERCRIME THAN THEY WERE 12 MONTHS AGO 57% STEP 3 IMPLEMENTATION OF SMB DECISION MAKERS SURVEYED PLAN TO BOOST IT SECURITY SPENDING FOR THEIR BUSINESSES IN 2015 STEP 4 Well-priced desktop network appliance saves energy and space. Well-priced desktop network appliance saves energy and space. Plug-and-play setup makes deployment easy for even less technical users. Plug-and-play setup makes deployment easy for even less technical users. Choose between Free and Complete to suit your needs and budget. Choose between Free and Complete to suit your needs and budget. Appliances are sold with an annual software license. Appliances are sold with an annual software license. Details Details The Untangle u50 NG Firewall Appliance is designed to give you a complete, footprint and silent operation make it the perfect choice for a desktop you want at the price you need. The Untangle u50 NG Firewall Appliance is designed to give you a complete, footprint and silent operation make it the perfect choice for a desktop you want at the price you need. Features Features NG Firewall Complete includes all of our paid NG Firewall applications: Web Filter HTTPS Inspector Decrypt HTTPS to allow other apps to process the datastream. Live Support For easy resolution of any technical Policy Manager Create web usage restrictions, such as teacher vs student. Branding Manager Customize "block" screens with your own messages and logo. IPsec VPN Securely connect your network to others. Application Control Control any application or protocol with a checkbox or use the Integrated Rules Engine to leverage other Untangle apps for complex rules. Hardware Example Web Cache Save time and money by caching frequently accessed items. Bandwidth Control Virus Blocker Prevent infections from reaching your network. Spam Blocker Stop spam before it hits your mail server. Directory Connector Enforce restrictions and view reports by Active Directory user name. Phish Blocker Intrusion Prevention Firewall OpenVPN Reports Captive Portal DESCRIPTION AMOUNT Hardware $ Cost Initial Assessment Cost $ NG Firewall Complete includes all of our paid NG Firewall applications: Web Filter HTTPS Inspector Decrypt HTTPS to allow other apps to process the datastream. Live Support For easy resolution of any technical Policy Manager Create web usage restrictions, such as teacher vs student. Branding Manager Customize "block" screens with your own messages and logo. IPsec VPN Securely connect your network to others. Application Control Control any application or protocol with a checkbox or use the Integrated Rules Engine to leverage other Untangle apps for complex rules. MONITORING & RESPONSE Installation $ McCann Oversight $ Items Listed To In IVA/EVA $ Quarterly First to be Conducted $ Annual Software License Web Cache Save time and money by caching frequently accessed items. Bandwidth Control If Onsite Required or Requested Prior to Quarterly Visit Cost Virus Blocker Prevent infections from reaching your network. Spam Blocker Stop spam before it hits your mail server. Directory Connector Enforce restrictions and view reports by Active Directory user name. Phish Blocker Intrusion Prevention Firewall OpenVPN Reports Hardware Example Hourly $ 255.00 3 Price Exam $ 3

STEP FOUR CONTINUED MONITORING & RESPONSE Ongoing vigilance isn t just something that s done after your new security plan s been implemented instead, it s actually part of the plan. McCann Security s team of experienced experts is committed to partnering with you to keep your digital operations running safely and smoothly, and to ensure that you re always prepared to avoid and overcome the latest emerging cyber threats. A PROVEN THREAT A TRUSTED SOLUTION STEP 1 ASSESSMENT STEP 2 AUDIT STEP 3 IMPLEMENTATION STEP 4 MONITORING & RESPONSE

FREQUENTLY ASKED QUESTIONS (FAQs) Is McCann Security licensed by the State of Texas Department of Public Safety (DPS) Private Security Bureau, and why is this important? McCann s cyber-security professionals have all undergone an FBI-level background check completed and enforced by DPS, and are licensed by the DPS Private Security Bureau providing documented confirmation of the credibility of our operations. DPS licensure means that Texas courts will allow admission of evidence produced and reports generated by McCann personnel if legal proceedings must be initiated. 7 Can McCann Security provide references for cyber intrusion and detection experiences, and for data leak and digital forensics? Why is this important? What resources can McCann Security deploy in the event of a cyber-security breach? I have less than 100 employees, how do I improve cyber-security for my business? I do a lot of work from my home, how can I keep my data secure there also? McCann s professionals are experienced in Cyber Intrusion/Detection, Data Leak Prevention, and Digital Forensic Investigations. Our qualification document includes a current list of references, as well as detailed comparative case experiences. This is a specialization, and our extensive proficiency as a firm increases the likelihood of successful outcomes. Regardless of the level of prevention, hackings and other security breakdowns can and do occur, and data is stolen. When this occurs digital events need to be investigated as requested and evidence can either go undiscovered or be rendered inadmissible if the work is performed by an unqualified or unlicensed technician. McCann operates its own digital forensic lab staffed by licensed, full-time computer forensic investigators and technicians. Our facilities feature equipment suited for handling today s mobile, desktop, and cloud-based forensic recovery and research requirements. McCann s simple yet effective four-step process is ideal for addressing the cyber-security concerns of your small business: it includes a preliminary review of what your organization currently has in place; a scan of your network to detect malware, spyware, and other security-related issues such as missing patches; a user-friendly report and suggestions for how to reduce your internal and external vulnerabilities; and continuous monitoring and regular audits to ensure your network is prepared to face evolving cyber threats. The assessment can be done during normal hours in less than a day, and won t interfere with your regular operations. Home networks and devices are often a preferred target of hackers who know that the residential defenses are tend to be less robust, while the potential data yield is equally high. Many professionals bring home critical business information daily on computers, tablets, and mobile phones, and store critical or highly sensitive personal information such as financial logins and figures on hardware that accesses the Internet via residential Internet providers. McCann s Security s process for safeguarding your home s digital resources is similar in structure and effectiveness to that for your business, except that it typically involves fewer devices and less time.

TO GET STARTED CONTACT MCCANN INVESTIGATIONS HOUSTON NATIONAL DISPATCH CENTER 800.713.7670 Take control of your organization s cyber-security by putting McCann Security s dedicated team and three decades of proven experience on the front line! MCCANN SECURITY SYSTEMS 10375 Richmond, Suite 260 Houston, TX 77042 mccann-security.com MCCANN INVESTIGATIONS ARE ACCREDITED MEMBERS OF MCCANN INVESTIGATIONS ARE CERTIFIED BY Texas License: C15690 New York License: 11000120404 New Jersey License: 5271