Getting Started/On-Boarding
.
GETTING STARTED/CLIENT ON-BOARDING
.
The below is our setup and on-boarding approach; it is initiated once you purchase the selected service(s) you're looking for and determine the number of devices you need to protect - each internet-connected device (smartphone, laptop, desktop computer or tablet) is considered a "User."
.
.
SIMPLE AS 1 - 2 - 3
.
1. Starting with a brief call (video or voice, at your discretion), one of our in-house security experts will help to determine your current cybersecurity environment and risk-posture as well as begin our client on-boarding process, after answering any questions you may have about our services.
.
2. We will then send you links to initiate the service(s) that you have selected.
.
3. After install has been completed and tested by our Security Operations Team, we can configure controls regarding your company's Security Policy, if you choose (it's included as part of our Support in our pricing)
.
- this can be, for example, blocking of streaming services to help reduce bandwidth costs at your HQ/branch locations or even blocking access, when guests/workers are utilizing your Network/Wi-Fi, to site categories, such as social networks, adult content, etc, in order to boost productivity, limit ancillary risks, improve client experience and/or, specifically for our clients who have also chose to implement our services to cyber-defend their families, protect your children when they surf the internet.
.
For example: what social networks do you want your employees, who are utilizing your network/wi-fi, visiting and, you allow sites to be visited, do you also want to allow employees/visitors to your offices upload photos and videos through your network ? Depending on your preferences, we can allow visitng but disallow uploading/downloading to improve your company's cybersecurity posture.
.
What streaming services do you want to allow them to visit, etc - can they download movies from Netflix utilizing your network or do you prefer to not allow that - these are the basics our team will help you with when we configure our solutions for you or your company.
.
Limiting access to social networks can also help to impede cyber-bullying, etc if you are utilizing our solution to cyber-defend your family.
.
Additionally, our weekly, monthly or quarterly web-traffic reports (included in our pricing) can help you see what websites your employees or children are accessing which can help prevent issues before they arise and banned websites can be added to your list by just sending us an email.
.
.
ADD-ON SERVICES
.
4. If you have added our Email Protection and MFA Add-Ons, we can also provide Compliance-readiness documentation (included in our monthly pricing) so that you have it handy and accessible for Federal/State Regulators, insurance companies, business partners, banks/financiers/potential acquirers, etc.
.
5. If you have added our Email Protection and MFA Add-Ons, we will also provide initial and ongoing Security-awareness training including:
.
"Discovery Eval" to quantify and validate who has access to your systems and data including data most critical to the value and operation of your business - this process of ours enables you to confirm or deny on-going access to individual users.
.
"On-going Cyber-Training Exercises" so that your employees are ready for and able to potential spot attacks - we provide "simulated phishing attacks", the most common method of attack, in order help improve your employees' cyber-awareness.
.
Our phishing-attack simulation email are animated for ease of explanation and can even be utilized to educated your children and make them more cyber-aware if you are utilizing our service to protect your family.
.
"Active-Triaging" is our approach to mitigating the current threats within your IT environment and remediating such threats so they do not pose a threat in the future.
.
6. Going forward, for all of our clients, we include a "Quarterly Cyber-Review" to make sure your environment is trued-up and functioning as you wish (this helps to address your company's employee-turnover, internal policy changes, etc).