Uncommon Information Technology Security Roots
Since 1994, we were sole proprietors with a single deep focus on providing information technology security solutions to individuals and small companies in Cleveland Ohio. We were freelancers, working with clients through our referral network.
We have changed with the tides of time and in 2009 we have come full circle to provide business-focused services: security integrations with analytics. Our focus, both past, and present is the same: threat intelligence and mitigation from beyond an ‘inside-out’ approach. Our preference is to build your business from the ground up with security in mind rather than the typical action of security as an afterthought or a final thing to do. Before the dotcom era of the 90s to the current state of large-scale hacks occurring 14 seconds, we support clients when they need our services most. Our preference is preemptive security audit though we recognize you have a choice to balance. We work with businesses to assess their weaknesses and develop plans to fill gaps in security. With 35% to 55% of your workforce working remotely, does your auditor and assessor account for this remote workforce?
It is 2020 and Covid-19 predominates every aspect of our society. From some estimates, we’re working from home up to 90% of our work force. Do you see the opportunities that a hacker does?