MSP Corp Prairie Dual Logo - BambooHR (2)

Protecting Your Future: Building a Strong Business Plan with Security Services and Assessments

Security Assessments

Given today’s cyber threats, security assessments are required for an organization’s sustainability. An informed security assessment is the foundation for a Security Business Plan and will:

1. Assist in meeting compliance with industry regulations

2. Improve Management’s understanding of current cyber threats and how to counter them

3. Identify a roadmap for security improvements

4. Provide the business case for security expenditure

5. Strengthen security policies and procedures

A security assessment is part of the journey to improving your overall security posture. The assessment provides the current state of security policies with descriptive guidance on how to take action.

CIS Controls Assessment

The CIS Controls are prioritized, well-vetted, and supported security actions that organizations can take to assess and improve their current security state. But this is not a one-size-fits-all solution. Many organizations cannot address all controls based on limited resources. As a result, CIS has organized the controls into three Implementation Groups. The groups are self-assessed categories for organizations based on relevant cybersecurity attributes. Each group identifies a subset of the CIS Controls that the community has broadly assessed to be reasonable for an organization with a similar risk profile and resources to strive to implement. These groups represent a horizontal cut across the CIS Controls. CIS considers Implementation Group 1 (IG1) to be “basic cyber hygiene” that is a minimum standard which all organizations should strive to meet.

Microsoft 365 CIS Benchmark Assessment

The Security Services Configuration Benchmark for Microsoft 365 provides prescriptive guidance for establishing a secure configuration posture for Microsoft /Office 365 running on any OS and includes Exchange Online, SharePoint Online, OneDrive for Business, Teams, Azure Active Directory, and in Tune. Assessments are tailored to the type of Microsoft licensing the customer is currently subscribed to based on 4 levels as described below. Many environments have a mix of license types that may overlap into multiple levels. The levels are a guide and not a strict list.


Azure CIS Benchmark Assessment

The CIS Microsoft Azure Foundations Benchmark is the security guidance provided by Center for Internet Security for establishing a secure baseline configuration for Azure. The scope of the benchmark is to establish the foundation level of security while adopting Azure Cloud. Assessments are typically performed for environments running virtual machines only and for environments running virtual machines plus SQL server(s). An assessment using all sub-controls may also be selected.

Security Policy Development

Information security policies are critical to an organization as they:

– Protect the reputations of the organization

Address legal and regulatory compliance requirements

– Protect your data and your customer’s data

– Address cyber security insurance requirements

– Clarify staff expectations with respect to cyber security

– Reflect the risk appetite of an organization’s management

– Provide accountability to staff for expected behaviors

– Enable you to respond to cyber security risk inquiries

Our certified Security Analyst will develop a security policy manual for your organization that aligns to the Centre for Internet Security (CIS) security framework. Our Analyst will present best practice security policies and will adjust the policies based on your input and your organization’s security posture. You will be provided with a set of policies that can then be used to implement processes and procedures.

Vulnerability Scanning

A quarterly vulnerability scan helps ensure your organization is following cyber security services best practice and helps identify threats that can be resolved before they impact your business. Scans are performed, reviewed and reported on by a certified Security Analyst. A scan is highly recommended prior to renewing your cyber insurance.

Darkweb Monitoring

Are your company’s user credentials on the dark web? Thousands of email addresses, passwords, and other sensitive data lands on the dark web every day, creating risk for your business — and you may not even know about a vulnerability until it’s too late. Dark web credential monitoring ensures the greatest amount of protection with 24/7/365 human and machine-powered monitoring of business and personal credentials, including domains, IP addresses, and email addresses. You will be alerted to compromised credentials in Dark Web markets, data dumps, and other sources, so you can act before cyber criminals do.

Threat Detection & Response

The Challenge

Many small and medium-sized organizations rely on firewalls and antivirus tools to protect their networks and consider it good enough. This “prevention-based” approach works at blocking threats that can be readily identified. Unfortunately, overreliance on prevention exposes the organization to unknown threats adept at slipping past preventative controls, rendering the business vulnerable to a data breach or ransomware attack. In an age where IT teams must anticipate a breach, defense in-depth calls for use of detection-based capabilities for discovery of threats you didn’t know were there.

The Solution

Our threat detection and response team delivers real-time intelligence and visibility into events occurring within your environment. We provide rapid investigation and remediation—all managed 24/7 by Security Operations Center (SOC) staff skilled at quickly discerning what’s real from the white noise of false positives.


• Threat detection anomalies and events

• Continuous security monitoring for your network and logs

• Detection and response procedures to reduce or eliminate emerging threats

• Open threat intelligence ecosystem to process threat intel from multiple sources

• Security orchestration to quickly respond to any incident

• Efficient solutions for regulatory and compliance requirements

Endpoint Defense

The Challenge

Hackers are skilled at bypassing traditional perimeter and antivirus defenses on their way to vulnerable endpoints. Once a beachhead is established, they begin their lateral movement tactics towards crown jewel assets. Unfortunately, their malicious intent too often appears as ‘normal’ user activity, rendering organizations with limited detection tools, monitoring and the expertise to discern a real threat from ‘white noise’ at risk of a data breach—or becoming the next ransomware hostage.

The Solution

Our “always-on” endpoint defense delivers enterprise-grade threat detection, incident response, remediation, and the benefits of a dedicated 24×7 Security Operations Center (SOC), so you can focus on what you do best, running your business. As a managed endpoint detection and response service, your environment is continuously monitored for thousands of virus and malware variants including multi-variant ransomware attacks and the latest crypto-mining infiltrations. Designed to rapidly identify the root cause of a threat and diagnose related corrupt source processes and system settings—when malicious behavior is detected, immediate response and remediation measures are initiated on the endpoint including disconnect, quarantine or roll back to an acceptable no-risk state. Threats are contained before they can do harm, and you stay operational. For best-in-class security services contact.


• Detect and remediate threats early in the threat lifecycle
• Strengthen the protection of critical assets
• Gain the expertise and coverage of a 24×7 SOC
• Remove the cost and complexity of solution deployment and management
• Focus on your running your business

Cybersecurity requires a framework & policies

Book a call to discuss options: