Dave Thomas 2 IT Security Consulting exists to ensure you’re information is as protected as possible. Need an assessment? Have questions? Contact me today!
Dave Thomas 2 IT Security Consulting exists to ensure you’re information is as protected as possible. Need an assessment? Have questions? Contact me today!
Breathe easy, I’m here to help.
—
Security is not a “one and done” exercise. So whether you have a general question, or it’s long after the risk assessments are done and follow up steps have been completed, let’s chat over the phone for 30 minutes whenever you need it! Get clear concise help in layman’s term from someone you trust and with whom you’ve built a relationship. I’m here to help and happy to do so!
—
Computer backup (with a user provided hard drive)
Scanning for indicators of compromise
Reloading operating system & enabling security settings
Loading a secure browser with anti-malware & anti-cookie software
Loading password manager
1-hour phone consultation
On-call support till 90 days after services rendered
—
Computer backups (with a user provided hard drive)
Scanning for indicators of compromise
Reloading operating system & enabling security settings
Loading a secure browser with anti-malware & anti-cookie software
Loading password manager
1-hour phone consultation
On-call support till January 2020
*Depending on scope & size
—
65 Page Plan to…
Assess network and technology issues
Uncover potential weaknesses, exploitation repercussions, and defensive countermeasures for specific critical information assets
Analyze the results of the assessment
Provide specific recommendations for mitigating risks and improving your security posture
Provide a multitude of clear, concise recommendations in laymen’s terms
Implement recommendations in order to increase security at the earliest possible date
Security Awareness Training to provide greater understanding of the threat to an organization and the cost to the organization of security breaches
BCP Training for employees to understand and implement effective countermeasures to quickly respond to network and system threats that may arise in the future