Cyber Security Services in Utah
Cyber Security is extremely important in Utah, which is why we have chosen to follow the NIST (National Institute for Standards & Technology) Cyber Security Framework. NIST provides a common language that everyone can understand from the boardroom to the server room. It is also widely adopted and accepted by cyber security professionals both nationally and internationally. Protek takes network security very seriously and implements the same cyber security requirements internally that we recommend for our IT Services clients in Utah. Some of the cyber security services we offer include:
Two factor strengthens access security by requiring two methods to verify your identity. It utilizes something you know, plus something you have in order to gain access to your account.
SEIM Log Monitoring
Advanced Security Monitoring: Collection and parsing of event logs in real time on 24/7 basis to monitor and detect cyber incidents. Monitored by “human eyes” in state of the art Security Operations Center by security experts. Includes collecting logs from both firewall and domain controller.
HIPAA: Monitoring of ePHI
Protek will implement reasonable and appropriate measures to limit access to ePHI to only those people who have access rights and prevent those who have not been granted rights from accessing ePHI.
PCI: Network Monitoring of CC
Protek will implement reasonable and appropriate measures to limit access to Cardholder Data to only those people who have access rights and prevent those who have not been granted rights from accessing Credit holder Data.
Dark Web Monitoring
Dark Web Threat Alerting: Proactive monitoring for your organizations stolen or compromised data and real-time alerts when data is discovered.
Advanced Firewall Services
Safeguards your network from encrypted threats with SonicWall Deep Packet Inspection of SSL/TLS and SSH. DPI-SSL delivers deep protection against encrypted threats. Includes management and end-user support
Cyber Security Assessments
Analyze your network to identify vulnerabilities that could leave your organization at risk of a business interruption. Depending on what we uncover, we will also make suggestions on ways to prevent unauthorized access, augment security systems, better lock down sensitive data, become more mobile and, in general, get more out of your existing technology infrastructure. We produce a Client Risk Report that is a 6-8 page Executive Summary that provides an overview of the devices on the network along with a network Risk Score and analysis of each potential issue we uncover. Run once per quarter.
End-user Cyber Security Training
Cyber Security training focused on educating your employees on the various techniques used by attackers and reinforcing company policy to protect your company, assets, and data.
Phishing Email Training
Email Security Training: Part 1: On-demand, interactive, engaging training with common traps and demos new scenario-based Danger Zone exercises and educates with ongoing security hints and tips emails. Part 2: Fully automated simulated phishing attacks, hundreds of templates with unlimited usage, and community phishing templates.
Email Protection – SPAM
Not all gateways are created equal, many allow infected mail onto your network slowing performance and frustrating employees. Protek provides SPAM Protection that keeps spam and viruses from impacting your organization.
Email Protection – Archiving
Cloud archive helps simplify data management and meet the growing demand for email availability, retention and retrieval.
Email Protection – Encryption
Sharing sensitive information should not require an advanced degree or complex technology. With secure messaging employees can specify controls on emails ensuring only intended recipients see confidential information.
Data Backup and Recovery
Protek offers a full remote backup solution for each of our clients regardless of size. Your data is one of the most valued assets to your organization and we are highly dedicated to making sure it is backed up and secure. Protek also offers a full disaster recovery solution for each of our clients.
Endpoint Security Platform
Protek provides an enterprise level product that takes your security to the next level. Carbon Black defends every endpoint against every type of attack, at every stage in the threat lifecycle. This Platform prevents, detects, and responds in a single platform with intelligent automation. Monitored 24 X 7 by a Security Operation Center.
This layer of security prevents access to inappropriate websites, blocks phishing sites, and prevents virus and malware infections when the user is both in the office or working remotely.
Password security is an important part of your business. Protek ensures that your company is setup with industry standard password policies for PCI and HIPAA compliance.
IT Asset Inventory
Protek is heavily invested in management tools which allow us to track all your company’s IT assets including: PC’s, Mac’s, Firewalls, WAP’s, routers, printers, etc.. This also allows us to document serial numbers, purchase dates, and warranty expiration dates.
Your company is setup with two Wi-Fi networks. One for the business and one for any guests who may be accessing the internet from your place of business. This separation allows company information to remain secure.
Windows/3rd Party Updates
Your company is kept up to date with all Microsoft security updates and most 3rd-party software.
Account Monitoring and Control
Access Control, Computer, and Network Security Policies – These policies help to identify any unauthorized access, changes, or suspicious activity on any restricted PC’s, Laptops, or Network equipment.
A dedicated technician that reviews a 300-point checklist on a regular basis to determine any technical risks and ensure that your network is in alignment with the industries best practices.
Cyber Security Insurance
Protek Highly suggests working with your insurance company to obtain Cyber Security Insurance for your organization.
Written Security Policies
Written Security Policies should be in place and accessible to all personnel within your organization. Our IT Support in Utah can help craft the necessary policies so you can implement them.
Culture of Awareness
Humans are the weakest link when it comes to your network and data security. This culture of awareness starts from the top down and should be something that is discussed often within your organization.
Just as you take measures to secure your personal home and assets, this should be done with your business as well. Basic physical security is a foundational step to adequately securing your business.