Defining acceptable use on your network by creating / updating an Acceptable Use Policy
Presenting your AUP in an engaging Security Awareness Training session
Ongoing alerts and e-letters on the latest scams to prevent the training from going stale
Measurable followup social engineering testing and training
Cloud- and desktop-based securitysolutions
Business ID Theft ...
Yes, cyber criminals can steal your company's identity too. Read More
Latest News: 12/05/17
County Mulls Payment ...
North Carolina county mulling $25,000 payment in ransomware attack from phishing email. Read More
Supermarket Liable ...
The Morrisons Supermarket chain was found liable for an employee's data leak. Read More
The FlexIT End-User IT Security Program