You will be provided with a cybersecurity network questionnaire that you will fill out and return to us via encrypted email. We will provide simple instructions for how to do this. Once you return it, we will:
NOTE: This typically takes 2-4 hours on our part. This time will be deducted from your 20 hours of support.
Delivery time: 30 days after you submit the cybersecurity questionnaire answers
This spreadsheet serves as a management tool for your cybersecurity program. It has pre-formatted and populated tabs that support you as you collect and track the following information:
Delivery time: 30 days after you submit the cybersecurity questionnaire answers
Policies are the foundation of any cybersecurity program. In order to align with industry best practices, your company must deploy a minimum set of cybersecurity policies. The package which we supply includes 12 policies and 4 support documents. Our Business Cybersecurity Program typically includes the following policies, but we will first review your risk assessment and then adjust the policy package to best address your risk profile. (Additional policies are available for an additional charge).
POLICIES:Delivery time: 7-14 days after you submit the cybersecurity questionnaire answers
This IRP is aligned with industry best practices and the Department of Homeland Security Cyber Risk Response requirements. It correctly address the following IR requirements:
Delivery time: 30 days after you submit the cybersecurity questionnaire answers
The single biggest cyber risk that any firm has is its people. Most of the time, it is human error that is the cause of cybersecurity incidents. While training is not a cure-all for these problems, training does reduce the number and seriousness of cybersecurity incidents.
Our Business Cybersecurity Program includes a one-year, Silver Level subscription to the KnowBe4 security awareness training platform for up to 50 of your employees. Additional staff can be added for an additional fee; please contact us for a quote. This includes full use of the KnowBe4 email phishing module and all training and support. This on-demand training program tracks employee completion of the required training modules and success or failure of each phishing exercise and other training. The system is very easy to use. (Delivery time: Annual KnowBe4 subscription starts within 7-14 days upon payment of the 50% deposit as described above).
Your Cybersecurity awareness training program also includes the following training:
ACCESS TO MITCH TANENBAUM'S NEWSLETTER AND CLIENT ALERTS--FOR YOU AND YOUR ENTIRE STAFF
Mitch's blog is recognized as one of the most informative and interesting cybersecurity newsletters in the country. New topics come out each week and Mitch always covers them in a non-technical way. Thousands of business people around the country depend on him to keep them informed and up-to-speed on cybersecurity. (Delivery time: Access to Mitch's blog starts within 7-14 days upon payment of your 50% deposit).
RANSOMWARE TRAINING
The FBI says that ransomware attacks against businesses were up 500% last year. You need to utilize the correct back-up procedures and your people must be trained to correctly respond. This on-demand, webinar training is both entertaining and informative and can be of value to all your staff and their families. (Delivery time: 7-14 days after you submit questionnaire answers).
PROTECT YOUR FAMILY MONEY TRAINING
Based on our very popular training program, this is also a very entertaining and informative webinar that provides information designed to help you, your family and your clients better protect their money during this golden age of cyber theft.
(Delivery time: 7-14 days after you submit questionnaire answers).
TECHNOLOGY ENHANCEMENT AND DIGITAL ANONYMITY TRAINING
This training is delivered via an on-demand webinar and an associated Powerpoint. The training is a compilation of important tools and techniques businesses and individuals can use to reduce cyber risk. This information was originally compiled by the FBI Agent and Chief Security Officer Michael Mercer and is supplemented by the latest info we have from our other resources. This is an absolutely amazing and necessary tool for owners of businesses of all sizes. (Delivery time: 7-14 days after you submit questionnaire answers).
COLORADO PROTECTIONS FOR CONSUMER PRIVACY LAW (H.B. 18-1128) TRAINING
This is an on-demand webinar training regarding this important new law for anyone doing business in Colorado. This webinar has been our most popular webinar for business leaders. (Delivery time: 7-14 days after you submit questionnaire answers).
THREAT INTELLIGENCE SERVICE
Access to our weekly newsletter that focuses on software patches, network vulnerability issues, legislative issues and more.
(Delivery time: 7-14 days after you submit questionnaire
answers).
EMPLOYEE CYBERSECURITY TRAINING ESSENTIALS FOR MANAGEMENT (PARTS 1 AND 2)
Security awareness training insights and tips for management by vCISO Mitch Tanenbaum.
(Delivery time: 7-14 days after you submit questionnaire
answers).
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aliquam blandit dapibus ipsum at volutpat. Ut venenatis et mi in porttitor. Praesent dolor sem, tincidunt vel ultricies ultrices, scelerisque vitae elit. Suspendisse facilisis euismod vehicula. Aenean nec lacus at justo dapibus congue id in neque. Quisque vulputate posuere arcu luctus volutpat. Nulla vestibulum tellus a dui eleifend, eu fringilla ante tempus. Nullam luctus, est vel consequat dapibus, felis orci tincidunt ante, nec mattis arcu elit vel orci. Fusce consequat nibh in nisi auctor, et aliquet libero consequat. Ut et suscipit nisi. Suspendisse dui lectus, porttitor quis facilisis ut, vestibulum at diam. Suspendisse dictum ultrices urna, ut iaculis massa mattis sed.
After you have built your cybersecurity program, you need to consider cybersecurity insurance.
The cyber insurance policy is in addition to your general liability policy. The problem with cyber insurance policies is that they are "non-standard form" policies, which means that unlike your auto insurance or home insurance, cyber insurance policies vary widely in their coverage and limits. One of the services we offer to larger companies is to review their cyber insurance policy and make sure they have the coverage they think they have. Many times they don't. We provide you with a basic primer and checklist to help you buy the right insurance. We'll also give you recommendations for a couple of cybersecurity insurance brokers whom we know and trust. (Delivery time: 7-14 days after you submit questionnaire answers).
This is information was originally designed to help accountants introduce cybersecurity due diligence to clients wishing to purchase, sell or invest in companies, but we found that all company leaders could benefit from this info. This discussion alone is worth what you are paying for the whole course. (Delivery time: 7-14 days after you submit questionnaire answers).
There is a critical shortage of cybersecurity personnel and those that are available are expensive.
For most businesses, it is impossible to justify the expense of full-time cybersecurity staff. Most companies don't even have the internal expertise to properly evaluate a candidate.
Our Business Cybersecurity Program provides you with 20 hours of personalized cybersecurity and or privacy support time that you can use whenever you need it. It does not expire. You can use our experienced cybersecurity and privacy experts to:
NOTE: This support is available 9 am-5 pm MST, Monday-Friday (U.S. holidays excluded). See our Terms of Use for more information. (Delivery time: As requested by client).
You will be provided with a privacy questionnaire that you will fill out and return to us via encrypted email. We will provide simple instructions for how to do this. Once you return it, we will:
This policy (policy # 12 above in your Cybersecurity Policy Package) describes your company's position and intentions regarding compliance with applicable privacy regulations. (Delivery time: 7-14 days after you submit the privacy questionnaire answers).
This is a privacy-related policy that is part of your policy package as described in the Cybersecurity Policy package above. (Delivery time: 7-14 days after you submit the privacy questionnaire answers).
(Delivery time: 7-14 days after you submit the privacy questionnaire answers).
Information that will bring you up to speed on this important directive. (Delivery time: 7-14 days after you submit the privacy questionnaire answers).
A non-technical training session on data mapping and how it relates to controlling non-public, private information. (Delivery time: 7-14 days after you submit the privacy questionnaire answers).
This sample website privacy policy is aligned with both the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). (Delivery time: 7-14 days after you submit the privacy questionnaire answers).
Sample website privacy language that is aligned with both GDPR and CCPA. (Delivery time: 7-14 days after you submit the privacy questionnaire answers).
Detailed matrix of various state privacy laws and details. (Delivery time: 7-14 days after you submit the privacy questionnaire answers).
Our BCC certification demonstrates that you have passed
certain professional cybersecurity standards and are trying to
meet your ethical and legal obligations to protect client
privacy and company data.
Proudly display your BCC emblem and show your clients and the
world that you are serious about cybersecurity.
With the purchase of the Business Cybersecurity & Privacy Program, you will receive a Gold Level Business Cybersecurity Certification assuming that you complete the program and are able to earn it. We stand behind this certification and take it seriously, so we are careful about certifying those who work to earn it.
A Gold Level BCC demonstrates that your organization has built a professional cybersecurity program and is committed to improving and maintaining that program.