Features & Quick Stats
Key Features
Cybersecurity Services:
- Penetration Testing
- Vulnerability Management
- Cybersecurity Program Development
- Microsoft 365 & Google Backup
Secure IT Solutions:
- UniFi Network Build-Out
- Radius WiFi Implementation
- UniFi Equipment Rental
- Tailscale Design
Core Business
Cybersecurity
How Cybersecurity Assessment and Services Helps Independent Agents & Brokers
By providing cybersecurity consulting and services designed for the SMB space, we empower you to meet data security requirements in a budget friendly way.
Partnerships
GIAC Advisory Board ISACA | Denver Chapter ISSA | Denver Chapter
Certifications & Awards
Subscriber Deals
Product FAQs
Cybersecurity & IT/MSP
CYBER-Provide reports on training activity?
Yes
CYBER-Offer flexible range of support contracts/plans?
Yes
CYBER-How on-site service calls handled for out-of-state-clients?
We do not.
CYBER-Share WISP templates?
Yes
CYBER-Have E&O insurance in place?
Yes
CYBER-Offer client references?
No
CYBER-Provide regular scans for PII on local devices and report location of files?
No
CYBER-Provide automatic patch management?
No
CYBER-Insurance industry client experience?
Yes
CYBER-Automatic vulnerability scanning capabilities included?
Yes
CYBER-Offer questionnaire/other resource to manage third-party service provider risks?
Yes
CYBER-Align WISP plan to insurance industry compliance drivers?
Yes
CYBER-Provide disaster recovery plan?
No
CYBER-Provide assessments on ongoing scheduled basis?
Yes
CYBER-Provide staff security awareness training?
No
CYBER-Provide forensic analysis in event of security breach using certified forensics consultant?
No
CYBER-EDR solution include virtual firewall solution?
No
CYBER-Technology specialty?
Cybersecurity
CYBER-Provide regular reporting indicating protections status/identified alerts?
Yes
CYBER-Require all technicians to have certifications?
Yes
CYBER-Support local hardware?
No
CYBER-Set up/configure SP/DKIM/DMARC?
Yes
CYBER-Provide Cybersecurity Risk Assessment?
Yes
CYBER-Endpoint solution monitored by?
Monitored by Client
CYBER-Provide tracked phishing email simulations?
Yes
CYBER-States in which you have clients
Across the USA
CYBER-Endpoint solution protection real-time?
Yes
CYBER-Have certifications with Microsoft/Network Management/Cyber Security?
Yes
CYBER-Types of support offered?
[Set number of hours monthly, annually, etc.]
CYBER-Offer SLA?
No
CYBER-Provide endpoint protection for distributed workforce?
No
CYBER-Vulnerability scanning for External/Internal Networks?
[External Networks, Internal Networks]
CYBER-Provide dedicated support person to clients?
No
CYBER-Provide risk assessment for new clients?
Yes
CYBER-Offer implementation plan of technology requirements based on evaluation?
No
CYBER-Network security attended by a person?
No
CYBER-Geographic range of your insurance clients?
National
CYBER-Provide immediate response once cyber event reported?
No
CYBER-Number of insurance agency clients?
100
CYBER-Provide frequent short training videos?
No
CYBER-Cyber Risk Assessment time to take?
Dependent on client, but can be completed in a day.
CYBER-EDR solution allow for automatic updates?
No
CYBER-WISP frameworks able to work with?
Almost anything
CYBER-Offer managed hosted solutions?
No
CYBER-Frequency of backups
3x daily
CYBER-Provide network security monitoring?
No
CYBER-Provide Written Security Policy for third-party service providers?
Yes
CYBER-Provide state cyber compliance guidelines/recommendations/solutions where agency operates?
Yes
CYBER-Provide WISP writing services?
Yes
CYBER-Experience with recovering client from cyber event?
Yes
CYBER-Have data center?
No
CYBER-Backups on-site?
Yes
CYBER-Offer 24x7 monitored support?
No
CYBER-Help customize WISP plan?
Yes
CYBER-Snapshot backups available?
Yes
CYBER-Backups off-site cloud-based?
Yes
CYBER-EDR solution behavior or database based?
Behavior patterns
CYBER-Provide penetration testing by certified consultant?
Yes
CYBER-Vulnerability scan frequently
continuous
CYBER-Provide backup and restore solution?
Yes
CYBER-Support email?
No
CYBER-Assist in resolving any cyber event issues?
No
CYBER-Create/provide incident response plan aligned with breach notification requirements?
Yes
CYBER-Provide Managed Endpoint Protection compliant with regulatory requirements?
No
CYBER-Links inside email messages scanned before opening?
No
CYBER-Provide email threat filter?
No
CYBER-Provide SOC for 24x7 monitoring?
No
CYBER-Endpoint Detection and Response (EDR) products
Can provide Microsoft 365 monitoring.
CYBER-Provide best practice training for email activities?
Yes
CYBER-Email backup/archiving solutions?
Yes
CYBER-Provide Incident Response Plan in line with regulatory requirements?
Yes
CYBER-Offer e-cycling/other data disposal services for non-public information?
No
CYBER-Offer MFA solutions?
No
CYBER-Cyber Risk Assessment score based on Likelihood and Impact?
Yes
CYBER-Provide managed email threat filter?
No
CYBER-Detect devices without protection installed?
No
CYBER-Users failing simulations automatically added to re-training?
Yes
CYBER-Provide vulnerability scanning?
Yes
CYBER-Remediation validation after penetration test findings addressed?
Yes
CYBER-Vulnerability scan software
nodeware
CYBER-How long have you been classified as an MSP?
Cybersecurity only.
CYBER-Provide email encryption?
No
CYBER-AI-based penetration testing?
No
CYBER-Provide spam filter?
No
CYBER-Percent of business managed services?
100
CYBER-Company classification
Cybersecurity only
CYBER-Help remediate discovered vulnerabilities?
Yes
CYBER-Cyber Risk Assessment based on NIST?
Yes