We Provide Solutions you need to protect your Network and Data!

About GUARANTEED DATA PROTECTION

Who are we… and why should you consider us?

  • Protecting Client Data for over 30 years!
  • Zero Trust Security – Never Trust – Always Verify
  • We Provide Solutions you need to protect your Network and Data!
  • Our experienced staff is comprised of Senior Security Analysts and Systems Engineers.
  • Guaranteed Data Protection offers options of managed service practices for organizations that prefer DIY or want to leave the heavy lifting to our highly skilled Security Team.

About GUARANTEED DATA PROTECTION

Who are we… and why should you consider us?

  • Protecting Client Data for over 30 years.
  • We Provide Solutions you need to protect your Data!
  • We provide ongoing enterprise support for small businesses to very large organizations.
  • Our experienced staff is comprised of Senior Security Analysts and Systems Engineers.
  • Guaranteed Data Protection offers options of managed service practices for organizations that prefer DIY or want to leave the heavy lifting to our highly skilled Security Team.

Information about our program

What does it cost?

Have you ever been to a mechanic shop where the sign says...

“There are 3 prices”

Well, it is a little like that…

Many of our clients like the DIY approach!

So, we have created 3 Levels of service for your convenience!

  • If you are a “DIY person”, we will provide you with recommended steps that will help you get to 80% secure – beyond this, there is a certain level of experience required.
  • Some clients like “Assisted Protection”. This is where you do all you can do, then invest in a 3 hour block of time, where we validate your configuration and make the necessary adjustments. We test your configuration and make recommendations.
  • Some clients want us to do everything. If so, just buy a block of time and we will coordinate with you to secure your world. If you desire to get to the 100% guaranteed level, we will be happy to take you there. Once there, you will receive daily reports to let you know the solutions are working to the 100% guaranty level.

Free guidance to help you start protecting your data and becoming secure take the following steps

These initial steps will get you to effective protection, without spending allot of time or money.
Let us help you find the right cyber security solution for you!

80% Secure

  • Establish a security policy and enforce it.
  • Educate your users – hold employee training sessions on security.
  • Never use an administrative level account as a user account.
  • Ensure UAC – User Account Control level is enabled and working.
  • Disable Windows Remote Desktop function, if you don’t use it.
  • Create Secure Passwords – Combination of Capital & Lower letter, Numbers, Special Characters.
  • Require Passwords changed on a specified timeframe – i.e. quarterly.
  • Enforce Account Lock-out Policy upon multiple incorrect password entries.
  • Enforce network-use permissions/guidelines for anyone with permission to access network data.
  • Apply OS – Operation System and all Software Application Security patches as they become available.
  • Remove any unnecessary extensions in your web browsers.
  • Ensure Windows Firewall is enabled.
  • Don’t click on or open questionable emails, links, or attachments.
  • Don’t allow employees to connect their BYOD (Bring Your Own Devices) and IOT (Internet of Things) Devices to your WIFI network.
  • Backup your data, two copies – secured in two different secure locations on-site and off-site.
  • Use an Antivirus Software – Windows Defender is the entry point and 99.6% effective.

90% Secure

  • Use a Commercial Grade Email Scanning Solution like Barracuda.
  • Did you know most attacks come via email?

95% Secure

  • Implement a Commercial Grade Firewall with Sand Box Function, Web Reputation Blocking.
  • All Firewalls are not created equal, we deploy two types of Firewalls to assure effectiveness.
  • We prefer a Firewall that works with the Antivirus to shutdown computer communications for infected computers.
  • At this point we have done about all that can be done to shield the environment from the bad guys. This is due to what is known as a ‘zero-day (also known as 0-day) vulnerability’. This is a brand new type of malware/virus that does not match a known pattern. It may use a door opened by another malware. This type of attack will generally come with a malware component.
  • For Home Users: Implement Sophos Free Home Use XG Firewall (no cost for home users)

100% Secure

  • Getting to 100% Secure requires a recovery method.
  • Layered defenses provide multi-tiered protection – a recovery method that includes several layers.

The first layer      – is a backup. Here we secure your data separate from the OS – Operating System, so your data is securely protected.
The second layer – makes a virtual copy of your machine. If your systems become infected, we can start the virtual backup. This will allow you to continue operations.
The third layer     – moves the virtual copy off site. The process will start and test the core operating components, to assure operational capability.
The fourth layer  – is Antivirus/Malware Software that is integrated with the offsite Recovery Layer. This will ensure that the offsite Recovery Layer is free of malware and virus.

Time to contact “GuaranteedDataProtection”

Prevention Is Always the Best Security Plan!

Getting to Zero Trust is the Best method for protecting your environment.

With 30 Years Experience – we have the proven solutions to take your environment to Zero Trust Security.
Let us Protect your Network and Data!

Prevention Is Always the Best Security Plan!
Getting to Zero Trust is the Best method for protecting your environment.

With 30 Years Experience – we have the proven solutions to take your environment to Zero Trust Security.
Let us Protect your Network and Data!

Interested?

Register for DIY Info

Then you can Login to view all the DIY articles!

Would you like to get pricing?

We will gather some information and provide you an option to look at our published pricing and recommended list of components.

Would you like to sign up for alerts?

We will keep you informed of significant and emerging threats.

Start typing and press Enter to search

Get Protection NowContact us
+