Sales: 801.290.0388   •   Support: 801.999.4767
  • Support Portal
  • Payment Portal
  • Remote Support
Protek Support
  • IT Services
  • Contact Us
  • About Protek Support
  • Do I Need IT Services?
LET'S TALK

Cyber Security Services in Utah

Cyber Security is extremely important in Utah, which is why we have chosen to follow the NIST (National Institute for Standards & Technology) Cyber Security Framework. NIST provides a common language that everyone can understand from the boardroom to the server room. It is also widely adopted and accepted by cyber security professionals both nationally and internationally. Protek takes network security very seriously and implements the same cyber security requirements internally that we recommend for our IT Services clients in Utah. Some of the cyber security services we offer include:

2FA

Two factor strengthens access security by requiring two methods to verify your identity. It utilizes something you know, plus something you have in order to gain access to your account.

SEIM Log Monitoring

Advanced Security Monitoring: Collection and parsing of event logs in real time on 24/7 basis to monitor and detect cyber incidents. Monitored by “human eyes” in state of the art Security Operations Center by security experts. Includes collecting logs from both firewall and domain controller.

HIPAA: Monitoring of ePHI

Protek will implement reasonable and appropriate measures to limit access to ePHI to only those people who have access rights and prevent those who have not been granted rights from accessing ePHI.

PCI: Network Monitoring of CC

Protek will implement reasonable and appropriate measures to limit access to Cardholder Data to only those people who have access rights and prevent those who have not been granted rights from accessing Credit holder Data.

Dark Web Monitoring

Dark Web Threat Alerting: Proactive monitoring for your organizations stolen or compromised data and real-time alerts when data is discovered.

Advanced Firewall Services

Safeguards your network from encrypted threats with SonicWall Deep Packet Inspection of SSL/TLS and SSH. DPI-SSL delivers deep protection against encrypted threats. Includes management and end-user support

Cyber Security Assessments

Analyze your network to identify vulnerabilities that could leave your organization at risk of a business interruption.  Depending on what we uncover, we will also make suggestions on ways to prevent unauthorized access, augment security systems, better lock down sensitive data, become more mobile and, in general, get more out of your existing technology infrastructure. We produce a Client Risk Report that is a 6-8 page Executive Summary that provides an overview of the devices on the network along with a network Risk Score and analysis of each potential issue we uncover. Run once per quarter.

End-user Cyber Security Training

Cyber Security training focused on educating your employees on the various techniques used by attackers and reinforcing company policy to protect your company, assets, and data.

Phishing Email Training

Email Security Training:  Part 1: On-demand, interactive, engaging training with common traps and demos new scenario-based Danger Zone exercises and educates with ongoing security hints and tips emails.  Part 2: Fully automated simulated phishing attacks, hundreds of templates with unlimited usage, and community phishing templates.

Email Protection – SPAM

Not all gateways are created equal, many allow infected mail onto your network slowing performance and frustrating employees. Protek provides SPAM Protection that keeps spam and viruses from impacting your organization.

Email Protection – Archiving

Cloud archive helps simplify data management and meet the growing demand for email availability, retention and retrieval.

Email Protection – Encryption

Sharing sensitive information should not require an advanced degree or complex technology.  With secure messaging employees can specify controls on emails ensuring only intended recipients see confidential information.

Data Backup and Recovery

Protek offers a full remote backup solution for each of our clients regardless of size. Your data is one of the most valued assets to your organization and we are highly dedicated to making sure it is backed up and secure. Protek also offers a full disaster recovery solution for each of our clients.

Endpoint Security Platform

Protek provides an enterprise level product that takes your security to the next level.  Carbon Black defends every endpoint against every type of attack, at every stage in the threat lifecycle. This Platform prevents, detects, and responds in a single platform with intelligent automation. Monitored 24 X 7 by a Security Operation Center.

Web Security

This layer of security prevents access to inappropriate websites, blocks phishing sites, and prevents virus and malware infections when the user is both in the office or working remotely.

Password Policies

Password security is an important part of your business. Protek ensures that your company is setup with industry standard password policies for PCI and HIPAA compliance.

IT Asset Inventory

Protek is heavily invested in management tools which allow us to track all your company’s IT assets including: PC’s, Mac’s, Firewalls, WAP’s, routers, printers, etc.. This also allows us to document serial numbers, purchase dates, and warranty expiration dates.

Wi-Fi Separation

Your company is setup with two Wi-Fi networks.  One for the business and one for any guests who may be accessing the internet from your place of business. This separation allows company information to remain secure.

Windows/3rd Party Updates

Your company is kept up to date with all Microsoft security updates and most 3rd-party software.

Account Monitoring and Control

Access Control, Computer, and Network Security Policies – These policies help to identify any unauthorized access, changes, or suspicious activity on any restricted PC’s, Laptops, or Network equipment.

Technology Alignment

A dedicated technician that reviews a 300-point checklist on a regular basis to determine any technical risks and ensure that your network is in alignment with the industries best practices.

Cyber Security Insurance

Protek Highly suggests working with your insurance company to obtain Cyber Security Insurance for your organization.

Written Security Policies

Written Security Policies should be in place and accessible to all personnel within your organization. Our IT Support in Utah can help craft the necessary policies so you can implement them.

Culture of Awareness

Humans are the weakest link when it comes to your network and data security. This culture of awareness starts from the top down and should be something that is discussed often within your organization.

Physical Security

Just as you take measures to secure your personal home and assets, this should be done with your business as well. Basic physical security is a foundational step to adequately securing your business.

Fame

Protek Support is the best IT Services provider in Utah and is owned and operated by Eric Woodard, CISSP. We offer small to medium size businesses IT support, IT strategy, and IT solutions across the Wasatch Front in Salt Lake City, Utah.

At Protek, our experts believe there is a better way of doing IT Services in Utah. If you’re being reactive, chasing fires, and waiting on your designated tech to fit you into their schedule, then you’re doing it wrong. The Pro in Protek stands for proactive, and it’s a word we live by.

Resources

  • Blog
  • Status Page
  • How-To Videos
  • FAQs
  • Payment Portal
  • Support Portal
  • Remote Support

Services

  • 24/7 Monitoring
  • IT Support in Utah
  • Cyber Security Services
  • IT Strategy
  • Moving Locations
  • Email Migrations
  • Disaster Recovery

About Us

  • Home
  • Contact Us
  • Testimonials
  • Take a Tour
  • About Protek
  • Refer Us!
  • Privacy Policy
Address: 542 W 9320 S, Sandy, UT 84070
Phone: 801.999.4767