Great question! We are a member of your team and work hard to not be seen as a vendor or outsourced IT department. We work best with companies that desire structure, process, and consistency in their environment. We often hear from prospects that they “just want technology to work”. That sounds easy, and it is with our 17+ years of experience. We often times provide a much better experience than in-house IT or our competition.
- Detailed documentation of equipment, passwords, network
- Change management – who is authorized to request access or purchase equipment/software?
- Asset tags for all managed equipment
- IT Scorecard review
- End user education
Yes we do!
As a cornerstone of our commitment to security, user education is extremely important to the success of a cyber security defense strategy.
The following is an often-used analogy…We can provide security for your home with best-in-class tools, but you have to remember to lock the door!
For our existing customers, instructions on how to take the course see How to Complete 2022 Annual Cybersecurity Training.