In order to correctly govern your IT infrastructure and manage IT risk, it is important to estabish your goals and define which (if any) regulatory requirements you have. We help you accomplish this by asking the right questions and documenting your goals and regulatory requirements. These are reflected in your WISP, cybersecurity and privacy policies, and other documents (see below).
Delivery time: 30 days after you submit the cybersecurity questionnaire answers
Support: This deliverable accompanied by CyberCecurity LLC's on-demand training video: Goals and Regulatory Requirements
Before you can protect your IT infrastructure and your data, you have to know what it is and where it is. That requires complete inventories of your:
Your WISP Management Tool (see below) contains areas where you will perform these asset inventories which serve as a foundation for your cybersecurity and privacy program.
Delivery time: This is your responsibility to complete
Support: This deliverable accompanied by CyberCecurity LLC's on-demand training video: Asset Inventory
You will be provided with a cybersecurity network and privacy questionnaire that you will fill out and return to us via encrypted email. We will provide simple instructions for how to do this. This will be delivered to you within 7 days of receipt of your first payment. Once you complete it and return it, we will:
NOTE: This typically takes 2-4 hours on our part. This time will be deducted from your 20 hours of support.
Report delivery time: 30 days after you submit the cybersecurity questionnaire answers
Support: This deliverable accompanied by CyberCecurity LLC's on-demand training video: Cybersecurity & Privacy Risk Assessment
The WISP is the overarching document that you will use to guide the development and operation of your Information Security Program in accordance with industry best practices and your specific regulatory requirements. This document directly references your cybersecurity and privacy policies and other documents.
Delivery time: 30 days after you submit the cybersecurity questionnaire answers.
Support: This deliverable accompanied by CyberCecurity LLC's on-demand training video: The WISP
The WISP Management Tool is a pre-engineered spreadsheet that serves as a management tool for your cybersecurity program. It has pre-formatted and populated tabs that support you as you collect and track the following information:
Delivery time: 30 days after you submit the cybersecurity questionnaire answers
Support: This deliverable accompanied by CyberCecurity LLC's on-demand training video: WISP Management Tool
Policies are the foundation of any cybersecurity program. In order to align with industry best practices, your company must deploy a minimum set of cybersecurity and privacy policies. The package which we supply includes 12 policies and 4 support documents. Our Business Cybersecurity Program typically includes the following policies, but we will first review your risk assessment and then adjust the policy package to best address your risk profile. (Additional policies are available for an additional charge).
POLICIES:Delivery time: 15 days after you submit the cybersecurity questionnaire answers
Support: This deliverable accompanied by CyberCecurity LLC's on-demand training video: Cybersecurity and Privacy Policies and Procedures
The single biggest cyber risk that any firm has is its people. Most of the time, it is human error that is the cause of cybersecurity incidents. While training is not a cure-all for these problems, training does reduce the number and seriousness of cybersecurity incidents. It is critical that all staff understands and supports the organization's cybersecurity and privacy programs.
Our Business Cybersecurity Program includes a one-year, Silver Level subscription to the KnowBe4 security awareness training platform for up to 50 of your employees. Additional staff can be added for an additional fee; please contact us for a quote. This includes full use of the KnowBe4 email phishing module, various training modules, and support. This on-demand training program tracks employee completion of the required training modules and success or failure of each phishing exercise and other training. The system is very easy to use. (Delivery time: Annual KnowBe4 subscription starts within 7-14 days upon payment of the 50% deposit as described above).
Your Cybersecurity awareness training program also includes the following training:
ACCESS TO MITCH TANENBAUM'S NEWSLETTER AND CLIENT ALERTS--FOR YOU AND YOUR ENTIRE STAFF
Mitch's blog is recognized as one of the most informative and interesting cybersecurity newsletters in the country. New topics come out each week and Mitch always covers them in a non-technical way. Thousands of business people around the country depend on him to keep them informed and up-to-speed on cybersecurity.
RANSOMWARE TRAINING
The FBI says that ransomware attacks against businesses were up 500% last year. You need to utilize the correct back-up procedures and your people must be trained to correctly respond. This on-demand, webinar training is both entertaining and informative and can be of value to all your staff and their families.
PROTECT YOUR FAMILY MONEY TRAINING
Based on our very popular training program, this is also a very entertaining and informative webinar that provides information designed to help you, your family and your clients better protect their money during this golden age of cyber theft.
TECHNOLOGY ENHANCEMENT AND DIGITAL ANONYMITY TRAINING
This training is delivered via an on-demand webinar and an associated Powerpoint. The training is a compilation of important tools and techniques businesses and individuals can use to reduce cyber risk. This information was originally compiled by the FBI Agent and Chief Security Officer Michael Mercer and is supplemented by the latest info we have from our other resources. This is an absolutely amazing and necessary tool for owners of businesses of all sizes.
COLORADO PROTECTIONS FOR CONSUMER PRIVACY LAW (H.B. 18-1128) TRAINING
This is an on-demand webinar training regarding this important new law for anyone doing business in Colorado. This webinar has been our most popular webinar for business leaders.
THREAT INTELLIGENCE SERVICE
Access to our weekly newsletter that focuses on software patches, network vulnerability issues, legislative issues and more.
EMPLOYEE CYBERSECURITY TRAINING ESSENTIALS FOR MANAGEMENT (PARTS 1 AND 2)
Security awareness training insights and tips for management by
vCISO Mitch Tanenbaum. .
Delivery time: 7 days after your first payment is received.
Support: This deliverable accompanied by CyberCecurity LLC's on-demand training video: Security Awareness Training
An important requirement for any professional cybersecurity and privacy program is to control access to the organization's IT infrastructure and data. In order to accomplish this you must:
After we accomplish the cybersecurity and privacy risk assessment (see above), we'll be in a position to help you set up your various access controls. Please note that several policies above relate to this subject matter.
Delivery time: 30 days after you submit the cybersecurity questionnaire answers
Support: This deliverable accompanied by CyberCecurity LLC's on-demand training video: Access Control, Identity Management, and Authentication
Data protection is basically what cybersecurity and privacy are all about. In order to protect your data, you must first know what data must be protected and where it is located. Then the following needs to occur:
Via the WISP Management Tool and other processes, we'll provide you with advice and support regarding the protection of your data.
Delivery time: 45 days after you submit the cybersecurity questionnaire answers
Support: This deliverable accompanied by CyberCecurity LLC's on-demand training video: Data Protection
This is a critical component of our program and is comprised of multiple policies, procedures, and third-party technical tools designed to provide protection for your IT systems and physical environments. Our comprehensive approach includes the following:
NOTE: Much of the above will be accomplished by providing guidance to your IT team (in-house or outsourced). Overall management of the process is accomplished via the WISP Management Tool (see above).
Delivery time: 60 days after you submit the cybersecurity questionnaire answers
Support: This deliverable accompanied by CyberCecurity LLC's on-demand training video: Systems and Physical Environment Protection
If it is necessary for any third-party vendors to have access the data you are responsible for, then it is your responsibility to insure that they are protecting it correctly and are abiding by your policies and procedures. The first step in this process is to identify what (if any) third-party vendors have access to your data or systems. The WISP Management Tool will help you inventory any such vendors and we'll supply you with tools required to bring these vendors into alignment with your data protection policies.
Delivery time: 45 days after you submit the cybersecurity questionnaire answers
Support: This deliverable accompanied by CyberCecurity LLC's on-demand training video: Management of Third-party Vendors
This IRP is aligned with industry best practices and the Department of Homeland Security Cyber Risk Response requirements. It correctly address the following IR requirements:
A key component of your incident and disaster prepartion process is your data backup. Various resources and a third-party technical tool are used to make sure you back up your data correctly.
Delivery time: 45 days after you submit the cybersecurity questionnaire answers
Support: This deliverable accompanied by CyberCecurity LLC's on-demand training video: Incident and Disaster Preparation
Cybersecurity and privacy are now joined at the hip since both of them are about protecting data. More and more states are enacting privacy programs and since the leader in the United States is the state of California we have modeled our privacy program to align with that regulation. Other states are copying that regulation.
Our privacy program is comprised of the following:
Delivery time: 45 days after you submit the cybersecurity questionnaire answers
Support: This deliverable accompanied by CyberCecurity LLC's on-demand training video: Privacy Program
There is a critical shortage of cybersecurity personnel and those that are available are expensive.
For most businesses, it is impossible to justify the expense of full-time cybersecurity staff. Most companies don't even have the internal expertise to properly evaluate a candidate.
Our Business Cybersecurity Program provides you with 20 hours of personalized cybersecurity and or privacy support time that you can use whenever you need it. It does not expire. You can use our experienced cybersecurity and privacy experts to:
NOTE: This support is available 9 am-5 pm MST, Monday-Friday (U.S. holidays excluded). See our Terms of Use for more information. (Delivery time: As requested by client).
Support: This deliverable is accompanied by CyberCecurity LLC's on-demand training video: Program and Technical Support
Our BCC certification demonstrates that you have passed
certain professional cybersecurity standards and are trying to
meet your ethical and legal obligations to protect client
privacy and company data.
Proudly display your BCC emblem and show your clients and the
world that you are serious about cybersecurity.
With the purchase of the Business Cybersecurity & Privacy Program, you will receive a Gold Level Business Cybersecurity Certification assuming that you complete the program and are able to earn it. We stand behind this certification and take it seriously, so we are careful about certifying those who work to earn it.
A Gold Level BCC demonstrates that your organization has built a professional cybersecurity program and is committed to improving and maintaining that program.