Our Blog

Digital Asset Access -Day 6 – Who can do what? Part 1


Hello! If you are new to the series on Small Business Security, make sure to check out Day 1. If you are all caught up, welcome back to. Today we are going to do through each of the digital assets you outlined previously to assess the accounts/users in each and their Digital Asset Access. When an employee moves…

Firewall Settings – Day 5 – Basic Hardening: Part 1


Welcome, if you are new to the series start with Day 1. For those who are all caught up let’s continue. Today we will spend our time shoring up some basic technical defenses. For those who are not overly fond of technology….You can do this :). First things first let’s make sure we have firewalls to…

Digital Asset Protection – Day 4 – Know Thy Stuff: Part 4


Hello! If you are new to this series on securing your small business in 5 minutes per day than you should start with Day 1. If you are all caught up then welcome back and let’s dive into it. Today, Digital Asset Protection, is the last day of “Know Thy Stuff”… at least for now. By…

Small Business Security in 5 Minutes – Day 3 – Know Thy Stuff: Part 3


Hello! If you are new to this series please start with Day 1 or if you missed any other days they can all be found Here. If you are all caught up, welcome back to Day 3 where we will spend the next 5 minutes continuing to incrementally improve our small business security situation with a digital assessment….

Digital Assets – Day 2 – Know Thy Stuff


Digital Assets – Day 2 – Know Thy Stuff If you are new to this series please start with Day 1. If you are returning, welcome back! So you have pulled together a list of your digital assets, applications and systems…now what to do with the list. First, let’s do some cleanup. Can you get rid of…

Small Business Security in 5 Minutes – Day 1


Small Business Security in 5 Minutes – Day 1 – Know Thy Stuff: Part 1 To get right to it skip the first paragraph… This is the start of a simple mission to reveal, in plain language, the actions you can take to protect your business and possibly create a CyberStrategy. Your business represents much more…

CONTACT
INFORMATION

SECURITY MANAGED.
BACK TO BUSINESS!

COST EFFECTIVE BUSINESS SECURITY

Cyber Risk Reduction

Request A Quote

request A consultation

Request A Quote

LAURA GRINDLEY

Business Operations Manager
Certified: GSEC, CompTIA A+
Education: BA, College of William and Mary
Areas of Focus: Project Management, Accounting, Logistics

DAVID HYDE-VOLPE

CTO / Principal Engineer

Certified: GCIH, GSEC, GMON

Education: BS – Chemistry, Clemson University, Completed PhD coursework in Quantum Theoretical Chemistry – Georgia Institute of Technology, Completed PhD coursework in Statistical Mechanical Theoretical Chemistry – Clemson University.

Areas of Focus: Secure Coding, statistical modeling, penetration testing, security architecture

GLENN JOHNSON

CEO / Principal Engineer
Certified: CISSP, GCIH, PMP, CRISC, CISA, CISM, CCSK; previous certifications include CCNP, CCSP, CCVP, CCDP
Education: University of MD. LaSalle University (BS/MS – Information Systems)
Areas of Focus: BC/DR, Quantitative Risk programs and analysis, 1/CISO and 1/CIO functions, security strategy and architecture

Subscribe to Vizius' newsletter
and access our FREE

Ramsomware Vaccine
Roadmap

Free Impact Assessment