Cybersecurity Services

The cyber threat landscape is always evolving. Be prepared with Buckeye Micro.

Your data is one of your organizations must valuable assets.  Loss of that data can be an annoyance, a legal nightmare, or an existential threat to your business.  From a drive failure, ransomware attack, or natural disaster, Buckeye Micro has you covered with a wide range of services.

“If you spend more on coffee than on IT security, then you will be hacked.”

  • Richard Clarke, Special Advisor to the President on Cybersecurity

Data Protection

Sleep well at night knowing your organizations data is protected from ransomware, natural disaster, and every threat in between with a solid backup plan. We recommend a 3-2-1 strategy for the most secure data protection.

  • 3 copies of the data

  • 2 different storage media

  • 1 copy off-site

  • Fast and reliable, Network Attached Storage (NAS) backups are your first level of data protection.

  • Improve backup security by adding offline, “air gapped” USB backups. By rotating the USB backup drives, this ensures that one drive is always disconnected and cannot be compromised by hackers. Combined with local NAS backups and online cloud backups, your data is secured with multiple redundancies and protected from multiple points of failure. All backup data is encrypted for an added layer of security.

  • Backup your valuable data to the cloud to protect for disasters that could damage or destroy your on-site backups. Cloud backups are always encrypted to keep your data secure. Packages start at 500GB and can grow with your storage needs.

Email and Endpoint Security

Advanced threat protection for email, workstations and servers.

  • IronScales is an AI driven email security platform. It includes malicious link and attachment scanning, as well as expanded reporting on emails and is community driven to help clamp down on new waves of spam or phishing attempts. Phishing training programs are also included to help train staff in avoiding scams. It also provides an easy way to report any messages that do make it into your inbox with just the press of a button.

  • Anti Virus protection for all servers and PCs from Webroot. Provides an advanced firewall, antivirus, ransomware and phishing protection without slowing down your PC.

  • Endpoint Detection and Response (EDR) provides advanced detection, prevention and remediation against advanced threats, including “zero-day” attacks. When an attack is identified, it can block the attack as well as automatically roll back any changes that the attack may have made. Replaces or augments other endpoint security solutions.

Multi-Factor Authentication

MFA reduces that threat by requiring another form of verification before connecting, greatly reducing the likelihood of a successful attack.

  • MFA can be enabled for free with most email systems, including Office365 and Gmail.

  • Using Duo authenticator from Cisco, users will be prompted to approve their VPN connection attempts at each login. The app will be installed on their smart phone and pop up a notification when connecting.

  • Windows domain administrator accounts will be required to approve their logins to your Windows servers and PCs. As these are the most sensitive and powerful accounts on the network, they are common targets for attackers.

Advanced Services

Training, assessment, testing and monitoring services will take your cybersecurity defense to the next level.

  • Using TeamViewer Remote Management and Monitoring (RMM) we can monitor Windows and common applications patch status on your computers to ensure that new and critical updates are being applied in a timely manner. With the expanded monitoring we are also able to identify issues on your stations faster and ideally before you realize they are there.

  • The weakest layer of security is usually the human element. We will help address that with monthly cybersecurity awareness training sessions delivered to your employee’s inbox. Also included will be regular phishing testing, sending fake scam emails to test who is clicking on them.

  • To be better protected from hackers, we will take on the role of the hackers. Penetration testing helps improve your network security by attempting to attack the network just like a hacker would. We will perform an external test, attempting to compromise the network from the outside by bypassing the firewall or through social attacks like email or phone phishing. We will also perform an internal test, from a computer connected to the organizations network. After testing, we will deliver a thorough report detailing vulnerabilities, exploits, and how these issues can be addressed.

  • Bi-annual security assessments ensure that security controls are in place and working as expected. Assessments will be conducted on-site and will usually require one day to complete.