Cybersecurity

cybersecurity icon

Practical and Powerful Defenses

You are living in a time of unprecedented external threat. This backdrop is set against a sea change in how, where and when people work. The very workplace itself has been more radically transformed in the last 24 months than it has in the last 24 years. Remote work, multiple OS’, BYO devices, widely divergent generational preferences – and the market together with your customers demanding innovation of your products, services and customer experience. There’s huge upside and downside.

Therefore, as your strategic partner, our goal is not security at the cost of productivity, but both security and productivity. 

At Accellis, we provide cybersecurity consulting to industries with some of the most stringent requirements, including legal, financial, banking, insurance, and government. Our experience in these regulated and targeted industries means we have an armory of expertise, certifications, and resources to harden your defenses. Our process – the Accellis Assessment Framework (AAF) – follows industry standards and best practices like NIST, SEC, and FINRA to identify and mitigate risks. But we also use a pragmatic and reasonable approach that balances security and compliance against your budgets and practical needs.

Contact us to learn more about our IT security offerings.

CORE Security by Accellis SecOps

Accellis CORE Security is our premier Managed Security Solutions Provider (MSSP) offering. It’s your digital security guard, protecting all of your IT assets in one powerful package paid for by most of the tools you already own but aren’t using today. This lowers your net-new security spend by more than 90%, while offering you enterprise capabilities previously exclusive to Fortune 500 companies.

By leveraging the Microsoft Public Cloud and your existing M365 license, we are able to provide a single pane of glass covering Multi-Factor Authentication, Conditional Access, Single Sign On, Vulnerability Management, DNS Protection, Email Protection, M365 & Desktop Backup & DR, CloudGen/Endpoint Detection & Response Antivirus, On-Premises Hardware Analytics, End-User Phishing Campaigns & Training, and Monthly Network Hardening, at no added cost to your existing M365 spend (*some restrictions apply). With optional SOC+XDR, 24×7 human monitoring and incident response, traditional VM scan engines, policy work, and breach testing, you are ready to meet any challenge.

Identity Security + Device Security + Data Security for all your users on all your devices (including BYOD) regardless where the users are, when they work, or what they work on – for coverage across your entire digital estate, 24×7.

Key Cybersecurity Offerings

Backup & DR

Your top threats in the SMB space are email and ransomware. Preparedness means having onsite and offsite backups that you have absolute certainty you can restore. Our backup solutions cover all physical and virtual workloads (on-premises and cloud), including M365, and offer multiple layers of redundancy. And, though it’s most important that you can restore, your ability to restore quickly is essential, too. That’s why our solutions can obtain any RTO/RPO. 

Email Security

When it comes to cybersecurity, email is the weakest access point, acting like an open door for 94% of malware breaches. The good news is that securing email is also one of the most cost-effective safety measures you can take, and Accellis has an arsenal of solutions to protect you and your network. Our solutions include domain fraud prevention, anti-spoofing, anti-impersonation, AI-based anti-spear phishing and anti-spam, cloud BDR with unlimited storage, and ongoing security training, all for a flat-rate monthly fee per user.

Cybersecurity Assessments

As experts in cybersecurity consulting, Accellis can provide invaluable insight into your security, compliance, and risk. Our staff have attained some of the industries best security certifications including CEH, OSCP, and CISSP. In the simplest terms possible, our assessments provide a snapshot of what you have, what you need, and how to bridge the gap. We look at the complete picture – from infrastructure design to policies and procedures to workflow considerations and beyond. And we won’t abandon you with just a dossier of data. We can continue to work with you to implement our recommendations.

Vulnerability Management

It used to be that VM scanning required your devices to be onsite and behind your four walls; no longer. With Defender for Endpoint, we are able to scan all your assets, including BYOD, regardless of where they are. Some organizations still require traditional monthly external and internal scans, with remediation reports; we do that too. And since your staff is already busy, if you need us, we’re there to help remediate discovered vulnerabilities. Vulnerability management is required by many industries and regulators and is the necessary last step (after Windows Updates and third-party patching) to prevent brute-force entry into secure systems.

Penetration Testing

Our customized penetration tests are designed to challenge your network security and elucidate areas that need improvement. Engagements can include running an external scan and attempting to brute force the top attack vectors, or we can customize a more detailed approach to include social engineering, dark web searches, spear-phishing, web scraping, and even physical security testing. In one of our recent tests, providing our security engineer with just the organization’s name and website address, we were able to secure nine Office 365 usernames and passwords in four minutes by spoofing a 365 login page and sending a spam email from a fake administrator at the firm.

Multi-Factor Authentication

One of the lowest cost, highest impact security investments you can make is MFA. Basic 2FA is included in all M365 plans. Once implemented, it almost takes a nation state to breach you. Hackers move on to lower hanging fruit. MFA means a hacker needs to pass through a few safety nets before they can access your equipment, software, or data. These may include something you know (i.e., password), something you have (i.e., trusted device), or something you are (i.e., biometric). Our MFA solutions can factor in geography (i.e., no login from outside the US), user behavior (i.e., risky sign in), anomalous activity (i.e., impossible travel), and even more advanced features like dark web searches to ensure your credentials aren’t for sale online somewhere. 

SOC, EDR and XDR

Working with our sister company, AgileBlue, we provide outsourced Security Operations Center as a Service with full XDR capabilities. With Defender for Endpoint, we are able to provide full EDR including enabling automatically quarantining infected assets for self-healing. Our solutions deliver 24×7 human monitoring, alerting, and logging, together with real-time incident detection and response. The average breach goes unnoticed for 45 days; this is where the real damage is done. Man in the middle attacks make a living off these 45 days. SOC/EDR/XDR allow us to reduce that intrusion to mere minutes providing you with the ability to stop the attack, prevent data loss, and eliminate the need to notify clients and law enforcement. Traditionally, to get a SOC, you needed to spend six figures buying a solution like Splunk and then another six figures staffing it. No longer.

User Phishing & Training

Even with the best security technology and policies in place, your defense is only as strong as the humans involved. While the best systems alleviate the possibility for users to make mistakes, users will nonetheless find themselves confronted by criminals at some point. It’s here, at this moment, that your investment or lack of investment in security training can make or break all the work you’ve done. Security training for your staff is necessary to build a culture of caring. Caring about each other, the business they work for, its clients and stakeholders. Accellis provides custom training courses designed to engage and educate your staff to rapidly increase awareness. These benefits will extend beyond the workplace into every aspect of your employees’ lives. We also offer monthly employee phishing campaigns, fully managed by our expert staff.

Why Accellis?

When it comes to your IT infrastructure and technology, prevention is the best defense. Accellis can help you look at every element through the eyes of a hacker and then address the gaps strategically and cost-effectively. We understand the importance of security, but we also understand your business and the importance of productivity. Our experienced and certified cybersecurity consulting staff will provide you with the highest level of personalized and relationship-focused service, keeping your business running smoothly and safely.

On behalf of our firm, I want to extend our thanks and appreciation to Accellis’ tremendous efforts yesterday in responding to the virus/worm that infected our network and workstations. I was out of the office when the virus hit but ... Accellis identified the nature and the scope of the issue even before we knew there was a widespread problem of any type. Accellis responded immediately and in force to root out the problem and restore our systems to working order in just a few hours – if not for those efforts, even we could see that the virus had the potential to shut us down for a much, much longer period of time. As Jeff said, we’ve wondered what might happen in an IT crisis, whether because of a virus, cyberattack, disaster in the server room, or other issue. Yesterday afternoon, we faced just such a scenario and Accellis more than proved it was up to the task.

REQUEST A FREE SECURITY ASSESSMENT

A free assessment of your security posture by our CEH, OSCP, and CISSP certified team.
Name
Consent(Required)