Managed CyberSecurity

Real-time CyberSecurity Protection & Response

Always Includes:

Cyber Security Upgrade

We're going on Offense...

702it has partnered with

Small Business CyberSecurity

Small Business CyberSecurity basics at high levels

Company, Administrator, User, Cloud, Training

Company: Dedicated space, Power, HVAC, Physical Security, Practiced Disaster Recovery Plan

Administrator: Windows updates, App updates, Firewalls, Anti-Virus, Anti-Malware, DNS Filtering

User: Change Passwords, Use Multifactor Authentication, no repeat passwords

Cloud: Same as the above, backups still required

Training: Passwords, Emails, Attachments, Thumb drives, Outside of Procedure, Testing

702it layered approach, employee involvement and owner approvals make for a strong defense.

CyberSecurity at a High Level

“CyberSecurity” is the latest buzz word in tech. “Cloud” was the place you had to be a couple years ago. “World Wide Web” was an original buzz word meant to grab your attention. Don’t be fooled. 702it has been protecting Las Vegas businesses and practicing CyberSecurity before a MEMEs or iPhones were invented. The term CyberSecurity does encompass a great deal more today and impacts businesses in ways you might not have thought about. If we group our attack surface areas into basic levels for small business we come up with five (5) main responsibility groups for consideration: Company Level, Administrator Level, User Level, Cloud Level, Training Level 

CyberSecurity Company Level

Physical security in your office and locations is really the first step to safety. If any non-authorized actors can touch your I.T. equipment there is high potential for breach or damage. If the wrong USB thumbdrive gets plugged in the right place your business could be in trouble. Door access control systems, security cameras, temperature and moisture sensors are very much a part of the total CyberSecurity protection. Securing the physical space your business occupies is your first line of defense. 702it has great business partners to help get your office secured.  

Things like power and water we take for granted in business and our personal lives too in the USA. Both providing clean, reliable and cheap resources. What if your office loses power or the AC goes out? What is the impact to your business? What happens if the office suffers considerable damage? Having a disaster recovery plan it not just for I.T. Like everything cyber it takes a village. Everyone should know what happens and minimally have been through one practice event. 

Taking the time at the company level to put proper safe guards in place shows all the other levels how serious or not so serious your approach to CyberSecurity. Having lunch and learns with staff is an excellent way to reward with a free lunch, build culture and educate about how your company handles CyberSecurity so everyone knows their responsibility level.   

CyberSecurity Administrator Level

We can go on for days about the Administrator Level because that is what 702it has done for over 20 years. Managed CyberSecurity is security. Managed anti-virus is different than anti-virus being installed. Yes, PCs and apps can update themselves but when and how might be important. We can trust employees with our bank accounts, products and customers, so we are confident employees with do their own I.T. Right? Wrong!

CyberSecurity is not a set it and forget it task to be completed some random morning by whoever is using the computer at the moment. In order to identify a problem before it causes issues standardization is required. After verifying a standard setup has been completed, someone checking over and over again regularly is the only way to ensure your CyberSecurity is up-to-date at all levels. Once standard setups are achieved changes will stick out like a sore thumb. Managing and monitoring standardized systems is critical to having a chance at mounting a defense.

Being alerted there is a problem or even saving the day before it gets out of control is great. 99% of what we do is getting out ahead of things. What happens when I.T. goes bad? What if you get hacked, have a fire or keep a malicious employee, what happens? Maintaining a complete CyberSecurity environment running and back things up. Sometimes when things go really bad the backups are the only thing that will keep you in business if your business can survive the recovery time. 

702it takes CyberSecurity to another level. We are a proud Huntress partner.


CyberSecurity User Level

Users as we call them are the employees you pay and give a great deal of trust. Users play a huge role in CyberSecurity. Users have the ability to inflict great harm. At the Company and Administrator levels is is up to us to give Users only the access with their job requires. If your company files are accessible to all employees regardless of job function that is on us not the Users. 

Users passwords are the #1 way the bad guys gain access. Users like to reuse passwords. This is very bad. We see in the news this company or that company gets hacked and usernames and passwords are revealed. If your employee uses the same password for everything it is a matter of time before the bad guys try that employees login to your company. Passwords are going away. Using multiple forms of authentication like getting a text message when logging in will help stop easy password breaches.

Users and cats have a lot in common. Both are very curious creatures. Owners and managers need to give employees permission to stop opening attachments. We need to train users to look for themselves and realize the email from micirosoft@gmail.com is not Microsoft and it is okay to delete that message. This is one form of user training and granting permission to not be so curious. 

CyberSecurity Cloud Level

The cloud is not some safe utopia we frolic through like meadows and flower gardens without a care in the world. The cloud is more like the ghetto. Actually, it is more like the ghetto at night without phone service to call for help. The cloud is a physically located somewhere in the world. The cloud checks a lot of the physical or company level requirement boxes but the fact still remains the cloud is physical at some point and everything physical will fail eventually. Stop thinking since you’re in the cloud so everything is safe.

The cloud is not automatically backed up. Having backups is another great misconception about the cloud. We can lose our data stored in the cloud. Usually, there are mechanisms for data versioning but not for backups. Backups will become important when the infection corrupts the whole file or folder version chain. 

The cloud is the same as the office. We need to protect and backup the cloud as we would any other business asset.

CyberSecurity Training Level

Water cooler talk about a fake email or a weirdo walking into your office are both training opportunities. At every CyberSecurity level there is a chance to talk about what is happening and what needs to be done. Companies should conduct training at least once a year to talk about current events. Topics can include what has been seen by the company so far and what is currently plaguing businesses. What are the employees seeing? Only good things come from these sessions. There are ways to test employees to see if they learned. Testing is an excellent way to identify topics that need further reinforcement

CyberSecurity FAQ

Is CyberSecurity New?

Some elements of protection and infection are new. I.T. Security is not new. The latest buzz word to scare people is CyberSecurity. You will not have to look hard for other scary words like hacker and cryptolocker near by. The truth is there is more to protect across a greater range but we are still practicing good ol’ IT Security.

Who is responsible for I.T. Security?

As outlined on this page and our site, security, I.T. security, CyberSecurity, national security and anything else that keeps the community safe is all our responsibility. The places we go and the things we do in the real world and in cyberspace have rewards and consequences. 

Do you perform maintenance during business hours?

No. We schedule our tools to run in the middle of the night. Also, issues that can be resolved without interrupting the users are done after business hours.

Can we purchase only CyberSecurity?

Yes. Yes you can buy aspects of CyberSecurity. You can buy Anti-Virus. You can buy filtering. You can even pay people to install it. This piecemeal approach will end in disaster and 702it knows complete CyberSecurity strategy is the only way to have a fighting chance.