Cyber Security FAQs
Q: I think my IT services company is doing enough, but how can I be sure?
TSP has performed many audits for organizations with an already established MSP relationship. We can assist in validating the hard work already done. We also identify additional opportunities to protect your security landscape further.
Q: I haven’t ever had a cyber security breach. Do I really need an audit?
There is a reason why the phrase “ounce of protection is worth a pound of cure” extends to cyber security as well. While many companies have not been hit with a major cyber attack, even something as simple as a phishing email might open up a foothold for ransomware. With the high average cost of a breach, isn’t it better to understand your organization’s risks and the steps to lower your risk? Ensuring you have good “cyber security hygiene” can be the difference between a bad day and a $150,000 price tag.
Q: I work for a company, and I am worried we aren’t protected enough.
You’ve come to the right place! We are happy to have an initial call to discuss our cyber security audits with you or any member of your team.
Q: I think I was a victim of a phishing attack. What do I do now?
First, you should contact your IT Services Provider to initiate any response plans that you have in place already – speed is of the essence. Secondly, begin changing passwords to any of your more sensitive or critical accounts (email, bank accounts, etc.). Especially any accounts that shared the same password. Once the dust has settled, TSP can analyze the attack’s root cause and identify recommendations to prevent another phishing incident.
Q: I don’t need a full audit. I just need a review of our current cyber security procedures.
Great! TSP can help to assess any of your existing defenses against industry best practices. Just contact us to get a quote for just the services that you need.
Q: Can you provide phishing awareness training for my employees? I am aware they may be my weakest link.
Yes, absolutely. TSP can implement periodic phishing emails that are made to try to trick people into click on links they shouldn’t. If someone clicks on the link, instead of downloading malware, it’s linked to a report where you can see exactly who is most at risk and do some training on digital security!
*Source