Feeling a little insecure?

Cybersecurity refers to preventative methods used to protect information from being stolen, compromised or attacked. It requires an understanding of potential information threats, such as viruses and other malicious code. Cybersecurity strategies include identity management, risk management and incident management. (definition from Techopedia)

TBT incorporates industry-accepted guidelines and methods in the development and implementation of cybersecurity planning assets for your company or organization. NIST (National Institute of Standards and Technology) has developed a framework that has become the benchmark for improving critical infrastructure cybersecurity. TBT adopts many of these framework guidelines in the creation of cybersecurity deliverables for our clients.

True blue Technology has developed and implemented Cybersecurity methodologies for several of our clients. In each case, these deliverables were intended to satisfy regulatory requirements in the financial industry. Whether or not your business or organization is regulated, TBT can guide you through the process of planning for and responding to a Cybersecurity event.

Our Cybersecurity offerings include one or more of the following deliverables:

  • Cybersecurity Plan (CSP)

    Documentation that thoroughly describes your IT assets, including strengths and potential vulnerabilities. This documentation details all methods and procedures currently being implemented to safeguard your infrastructure.

  • Business Continuity Plan (BCP)

    A comprehensive strategic document that ensures that your company or organization will continue to effectively function in the event of a cybersecurity incident or a disaster.

  • Disaster Recovery Plan (DRP)

    A Disaster Recovery Plan is designed to ensure the continuation of vital business processes in the event that a disaster occurs. It can be defined as the on-going process of planning, developing, testing and implementing Disaster Recovery management procedures and processes to ensure the efficient and effective resumption of vital business functions in the event of an unscheduled interruption.

  • Disaster Recovery Testing

    True Blue Technology has developed a testing methodology that enables us to execute partial to full systems recovery scenarios while onsite at your business location. We will construct and execute a comprehensive test plan that identifies your critical business components within your IT infrastructure and then restores in parallel those components from available backup sources. The plan also includes full documentation of expected and actual results of the disaster recover testing exercise.

  • Vulnerability Scanning

    A comprehensive scan of your entire network that produces diagnostics and reports identifying anomalies or potential vulnerabilities. This information guides the process of remediation – adjustments or patches that eliminate the potential for intrusion.

  • Anti-virus and Anti-malware

    TBT recommends a two-pronged approach to protecting your computing devices from viruses and malware. The two are often separate entities and thus may require distinct detection agents. We have found through experience that ESET Antivirus running alongside Malwarebytes Anti-malware affords comprehensive protection against infection. Additionally, endpoint installations allow real-time monitoring for suspicious activity at both the workstation and server level.

  • Employee Cybersecurity Training

    We can help educate and train your employees to recognize and minimize potential cybersecurity threats. Most cybersecurity breaches are caused by inadvertent human error. TBT can tailor “best practices” documentation to fit your company or organization. We will even conduct onsite training, if desired. Let us help you keep you people and your assets safe!