Cyber security requires a framework & policies

Learn more about these 3 Assessments that follow the CIS framework:

  1. Cyber Hygiene CIS Assessment
  2. Microsoft 360 CIS Benchmark Assessment
  3. CIS Assessments for Implementation Groups 1, 2, or 3

What are you getting from this call?

  1. A discussion on which assessment would provide your organization the most value
  2. A review of the deliverables provided
  3. A quote for the selected assessment
CIS_Master_Logo_Type_Stacked_RGB_R (2)
CISSP - Square
Choptain, Tyson

Tyson Choptain
Executive Vice-President

Martynuk, John

John Martynuk
Security Analyst

Book my call to discuss options:

  • MM slash DD slash YYYY
  • :

Why Broadview Networks?

Exceeded Customer Satisfaction
Total Call Received
Percentage of Calls Answered
Issues were resolved on the first call
Issues were resolved within the same day
Average Seconds Waiting in Phone Queue

*Data represents March 2020 to February 2021

Are your credentials safe?

Run a scan to see if passwords associated with your domain have been compromised on the Dark Web.

Are your employees a cybersecurity risk to your business?

Empower your employees to be part of your security solution. Get a quote on phishing tests & security training.

Watch the recorded webinar: