(219) 617-2651

Ron@ronbushconsulting.com

Do you know who as access to your data, and what data is at risk?

Are you actively working to protect your data from attack?

Do you have a plan in place if your data is breached?

We can help – learn more below.

risk-copy

Risk Assessment

Our system assessment can be run on individual computers, or entire networks. The reports generated identify information system weaknesses and threats lurking within. We then share recommendations how to mediate the identified risks in your information system.  Close attention is given to safeguarding the private individual information and/or private health information of both your employees and your customers.  Our goal is to decrease your liability by strengthening your information security.

policy-copy

POLICIES & PROCEDURES

Results from the risk assessment help us create/refine policies and procedures to establish protocols to maintain a healthy information security system going forward. The policies & procedures also establish the framework for steps to take in the event of a data breach or data corruption.

employee

EMPLOYEE TRAINING

New/revised policies and procedures are put to work through employee training sessions. Our personalized employee training is tailored for your staff, large or small. We take into account your employees’ learning style and level of comfort using technology. Our focus is making sure they understand how to keep your system secure, as well as the steps to take in an emergency.

identity

IDENTITY THEFT PROTECTION

One in four people have experienced identity theft. Proactively protect your identity, your credit, your investments, and your reputation.

data

OFF SITE DATA STORAGE

Your system is only as good as your last data backup. If your data is only backed up locally and a fire or natural disaster impacts the area, all of your data is lost. If your data is corrupted and you only have one backup you are putting your system at risk. Off site storage allows you to keep data both locally and remotely. Let’s talk about how to backup your data the right way.

cyber

CYBER SECURITY

Protect your individual computers, your network, and the personal/health information of your employees and clients. Reinvest in your business by making your information security system as stable as possible. Work with us to safeguard your reputation against fraud, protect your information from data breaches, and establish procedures for both day to day activities as well as emergencies.

Contact us now

free consultation

Your Name (required)

Your Email (required)

Subject

Your Message