104 1/2 W 9th Ave Suite 500

Winfield, KS 67156

Mon - Thurs 8 am - 5 pm CT

Fri 8 am - 4 pm CT

Stay Up-To-Date On Cybersecurity And Website Information. Join Our Newsletter Today!

Logo for Custom Internet Services LLC

104 1/2 W 9th Ave Suite 500

Winfield, KS 67156

Mon - Thurs 8 am - 5 pm CT

Fri 8 am - 4 pm CT

104 1/2 W 9th Ave Suite 500

Winfield, KS 67156

Mon - Thurs 8 am - 5 pm CT

Fri 8 am - 4 pm CT

Stay Up-To-Date On Cybersecurity And Website Information. Join Our Newsletter Today!

Do You have a plan in place to protect against cyber attacks?

Cybersecurity & Recovery Plan

cybersecurity for your team

Our Cybersecurity Services

Cybersecurity Assessment

An accurate assessment of the current state of your network and software systems is always the first place to begin when considering Cybersecurity. We will work with your team to determine what needs reviewed in your situation and then craft a customized assessment to reach those goals. This assessment can include, but is not limited to, the following types of items –

  • Reviewing what the world sees thru your public IP addresses
  • State of operating systems, applications, and updates across your servers and client computers
  • Mobile device access & issues.
  • Wireless access security
  • State of routers, switchers, and other controllers.
  • Practices for handling Personally Identifiable Information
  • Current state of backups
  • Existing IT policies
  • And other issues that might be important in your situation!

Cybersecurity Planning & Implementation

Based on the results of the Cybersecurity Assessment, we can help you develop a step-by-step plan customized to your situation. This plan will help you get the ‘most bang for your buck’ by focusing on the initial steps with the biggest payback in your network. We can also help you create appropriate IT policies so that everyone knows what is expected.

Cybersecurity Training

You can find a whole section on our Cybersecurity Training. If you need something not listed or you require a custom class, please contact us.

Incident Recovery Evaluation

No one wants a cyber incident, but they will happen for the majority of businesses. Let us work with you to evaluate just what your organization could withstand in an incident, and then help you craft and implement a plan to increase your resiliency in the event of an attack.

Incident Recovery Pre-Planning

Because the chances are high that your organization will experience some form of cyber incident, it is only prudent to make plans for that possibility.  Custom Internet Services can help you develop those plans. Depending on your situation, we’ll focus on two primary areas —

  • Data Recovery Planning & Implementation: This is a hugely important area that far too many organizations don’t handle well. The proliferation of computers, tablets, mobile devices and cloud services often results in data being scattered across all these devices and clouds. Without a data backup plan that takes into account this plethora of devices and clouds as well as their individual backup needs, it is far too common to discover that something critical failed to get backed up.  You can find much more on this topic under the ‘Data Protection’ main menu at the top of this page. We’d love to help you solve this problem.
  • Network Recovery Planning & Implementation: It is far too possible that a cyber incident will result in a portion of your network becoming unusable for a period of time. We can help you craft a plan to handle that possibility.

Incident Response

You’ve done your best to secure your network while planning and preparing in the event of a breach.  Yet despite your best work, it happens – your network has been compromised in a cyber incident.  Now what?

There’s no doubt this can be a scary time. And how you respond can be important in determining the legal ramifications. Call us at 620-221-3614 for assistance to recover from that incident.

How Do I Begin Securing My Systems?

Review Your Systems And Make A Plan

Take stock of the current state of computers, operating systems, network devices (switches, routers, controllers, radios, control systems, etc) WAN links, and other components. This would be a good time to contract with us for a Cybersecurity Assessment so that your network can be evaluated from an impartial perspective.

Begin with a well-respected plan like The Critical Security Controls for Effective Cyber Defense maintained by the Center for Internet Security or a different plan appropriate for your industry. Evaluate where you want to go against this plan and what is appropriate in your context. This is also a good time to review your IT policies. No one enjoys crafting policy, but good written statements are the starting point for handling the various legal issues involved in Cybersecurity.

Implement Your Plan And Monitor It

Start with the “First Five Quick Wins” from this plan and implement more of your plan in a staged roll-out.

Continuous network monitoring is a must to know the state of your network. How can you know if your defenses have been breached if you’re not continuously monitoring these defenses? For starters, I would suggest monitoring device logs, net-flow information, antivirus defenses, and availability of the most important business processes.

Train Your Staff

Good training doesn’t cost – it actually pays off big for your organization. Custom Internet Services has developed four targeted seminars to help your business develop a culture of cybersecurity.  Each of these classes can be presented in person or as a webinar.

Cybersecurity & Recovery Plan

incident recovery for you

Evaluate Your Business

Just how much downtime could your company endure and yet survive? Do you have critical services that customers depend on that need to be always on? Do you need a backup network immediately available? How quickly do you need to be able to recover your data?

These are some of the questions you need to ask yourself when you start to think about Incident Recovery. Most businesses would not survive a few days before they went bankrupt.

Create A Data Recovery Plan

We all know we should have data backups, but far too many organizations don’t have a dependable backup plan and solution. Any data recovery solution needs to plan for recovery of both local and cloud-stored data.

All the data stored on various computers needs to be evaluated for backup requirements.  Once a backup plan is created, the next important step is to test recovery based on that backup plan. It is far too common for backups to be regularly created, only to discover upon attempted recovery that some key file is missing.  Plan, and then test your plan

Cloud providers come under attack, go broke, or otherwise have system failures.  It is also possible for your cloud data to be unavailable because of a legal action from some government, even if that legal action isn’t directed against you. Plus, internet access can fail which will limit the accessibility of your cloud stored data. We recommend that you plan for a backup of all cloud stored data.

Create A Network Recovery Plan

You also need to consider your plans in case your network is unusable. Do you need to rent an alternative network as a backup? Could much of your processing move to a cloud provider like Microsoft Azure? Or do you have enough leeway that you could wait for a vendor to provide new equipment? These questions need to be settled before an emergency.

When To Involve Legal

Perhaps one of the trickier questions to consider is what your legal liabilities are in the event of a data breach. Do you have customers in the European Union or one of the states with stricter breach notification laws? Do you handle Personally Identifiable Information (PII)? If so, how would you handle a loss of customer PII? Do you have contracts with customers that would be affected in a network breach? What are the legal requirements in your jurisdiction? And do you want to get law enforcement involved in any breach? These questions are important to consider before an emergency arises and should be determined in coordination with your legal team.

What's The Risk In Not Having A Plan

The risk of a cybersecurity event is just a normal part of business today. Because of that risk, it would be wise to consider cybersecurity insurance.  A number of companies provide policies in this realm. We prefer a policy that includes resources to help the business recover from a cyber event as well as provides coverage for any customer or client losses. We know that this whole process can seem pretty overwhelming. Feel free to contact us so we can help your business create a plan to withstand cybersecurity incidents.

Logo for Custom Internet Services LLC

Don't wait until it's too late

Subscribe

* indicates required
Custom Internet E-mail Groups

Custom Internet Services LLC will use the information you provide on this form to be in touch with you and to provide updates and marketing. Please let us know all the ways you would like to hear from us:

You can change your mind at any time by clicking the unsubscribe link in the footer of any email you receive from us, or by contacting us at steve@custominternet.biz. We will treat your information with respect. For more information about our privacy practices please visit our website. By clicking below, you agree that we may process your information in accordance with these terms.

We use Mailchimp as our marketing platform. By clicking below to subscribe, you acknowledge that your information will be transferred to Mailchimp for processing. Learn more about Mailchimp's privacy practices here.