Backup Computing/Legal CyberSecurity
Lake Stevens WA

The Legal CyberSecurity Security Stack

The Overriding Need for Security for EVERY Lawyer and Office

We provide the data security you need by:

  1. Providing protection from being infected by ransomware, viruses, and malicious usage in the first place.
  2. Providing protection and remediation when something does slip through or is introduced from within.
  3. Providing immediate response services to the intrusion and ways of protecting the rest of the network until the infection is removed.
  4. Providing Backup and Continuity solutions that undo the damage done by hardware failure, ransomware, malicious internal attacks, mistakes, and other data destroying activities. With rapid rollback and virtualization, your business can be up and running in minutes instead of being down for hours or days.

We will work with existing IT staff or managers to provide your firm with the security and safety you need so your data is not compromised, stolen, misused, or lost.

Everything provided helps to make sure we keep ahead of the current security needs of all customers. There has been a sharp rise in ransomware and cyber-attacks, many with widespread consequences. These infections are getting more sophisticated, better at avoiding traditional methods of protection. Because of this, we have improved the security stack offered to all customers.

We provide Enterprise-class security for small offices. No longer do you need to have multi-million dollars in billables every quarter to have Enterprise-class security. We can provide this because as an MSP, we partner with providers who work with us in the channel to deliver solutions affordably to any size of business. Don’t get us wrong if you grow, we can grow and scale with you to provide the solution you need now and into the future.

Legal CyberSecurity Security Stack 

Our Offered Desktop/Server/Laptop Security Stack (Changes may be made as new threats are realized):

1. Datto/Autotask RMM – Remote management and monitoring of devices. The RMM allows for direct support take over and/or activity to keep computers running efficiently and safely. The RMM tool can be used by authorized users of our clients to remotely access computers from the road with other devices in a more secure way.
This software also allows for remote access to address security events immediately via remote takeover, scripting tools, or remote launched infection removal tools. 

2. Webroot or SentinelOne Anti-Virus – Both are known as Enterprise-Class anti-Viral (AV) products. Managed and deployed by us so it’s always up to date and helps prevent infections and provides remediation if something does sneak through the other layers.
Both provide a small footprint unlike many of the consumer-grade AVs like AVG, Avast, Norton, MacAfee, etc… Enterprise-class takes advantage of cloud-based definition files and advanced heuristics to better and more quickly address emerging security threats.

3. ThreatLocker – Application, storage, and privilege control with ringfencing. You need more than an Anti-Virus (AV). AVs are generally good for reducing/correcting infections that are already on the machine. ThreatLocker works to prevent them from ever getting on the machine in the first place. Instead of treating the symptoms of an infection, ThreatLocker allows us to prevent the infection in the first place.

  • Application Control – Only users authorized can run applications. This process limits applications and users to only installing things they are authorized to do, controlling who does updates, who is allowed to change configuration files. These processes go one step further than the built-in controls from within most software.
  • Ringfencing – This is a process that makes sure applications stay in their lane (i.e. only do what they were designed to do, Word for editing documents, Excel for working with spreadsheets, etc.). This sets policies and limits for what applications can do, and ONLY what they are meant to do. This helps protect against hackers using Office file macros to launch their attacks and download their code. Also prevents other software from executing programs used to deploy ransomware and keyloggers on your network.
  • Privilege – All users run as standard users which eliminates the local administrative rights (Thus preventing application and users from installing software, hacks, and running files without the right permissions). On a case-by-case basis or for some software like QuickBooks. Admin rights can be given for that application alone so the user can do what is needed but is restricted from installing or changing other software unless previously approved. Whenever new software is needed, we are prompted to allow and raise the privilege needed.
  • Storage Controls - Provides an authentication and approval step for installing new software that has not been previous approved. Storage control prevents the BYOD that are not running ThreatLocker from accessing network files and programs. This prevents unpatched or insecure laptops and devices from accessing business data unless fully secured. Storage control also addresses network shares and program access to help prevent internal compromise that goes beyond access controls found in Windows shares.

4. Breach Secure Now  - Security Training, Dark Web Scanning/Monitoring, Policies, and Compliance.
Have a complete security solution by adding training, monitoring of breached materials, and rock solid security policies. Instead of writing your own use legally reviewed and detailed documentation to protect you and your data. Professional training and weekly micro-training that takes 2-3 minutes will keep you and your employees fully aware of the current security threats and how to avoid them.
Our package also includes regular phishing simulations and attacks to test training and help prevent bad habits by employees.

Optional Add-ons. 

8. Blackpoint Cyber/NovaSoc – Both provide a 24x7x365 SOC (Security Operations Center) to customers through a partnership with us. They provide direct security monitoring of the entire network and computer activities watching for security issues and behaviors. When rogue behaviors are detected, immediate action is taken to remedy the issue or disable the affected device so the infection cannot spread through the network further.
The SOC service is really the last line of defense when an infection has gotten past the initial layers. To have fully compliant SEC, HIPPA, and other regulatory compliance, deploying a SOC is a suggested step. Our partners in this specialize in only providing Security response so they are centered on providing something that used to be limited to very large corporations.
We encourage all our customers with more than 5 computers to seriously consider using this service. Those under 5 in special cases will be appropriate and will be considered on a case-by-case basis.

10. HIPPA, SOC, etc… Compliance Training and Controls – Add on for offices that have governmental requirements to protect health and customer data. If you have a need to improve your compliance training and documentation we could very well be able to help at an affordable level. 
This is an add-on and extension of the previously mentioned Breach Secure Now.

For offices using the Full Mircosoft or Google Office Suites we can provide further phishing and email security with:

ProofPoint Essentials Pro – ProofPoint protects email from phishing attacks, virus attachments, rogue links and emailed virus exploits (where a virus uses your email client to send viruses to others). Also included is Email backup and archiving of up to 10 years of emails. This software also provides an emergency inbox for continuity.

IronScales Core - IronScales includes IronTraps, an automated email phishing protection, detection, and incident response module that eliminates the need for highly trained security analysts to manually deal with every email phishing threat while reducing the time from phishing detection to remediation from weeks or months to just seconds.

Need True IT Security, Contact us for a free customized evaluation?


©2022 Copyright. All rights reserved.