The Boring Stuff is our Favorite Stuff

Many of our new clients come to us after a breach because nobody dug deep into the boring stuff. Fear not; we love it and will dive right in.

  • Do you have backups monitored and managed securely with adequate redundancy and isolation without paying for stuff you don't need? Probably not. We fix it.
  • Are all of your Microsoft Configurations locked down? Probably not. We fix it.
  • Is your WordPress or other website locked down, monitored, and updated whenever a new patch or problem comes out (typically weekly or more)? Probably not. We fix it.
  • Is your AWS configured correctly? Probably not. We fix it.
  • Are your website administration login and related sensitive files exposed to the Internet? Probably. We fix it.
  • Is your email configured to meet the new 2024 requirements? Probably not. We fix it.
  • Are your industry-specific tools that most managed IT tools ignore monitored for patches and vulnerabilities? Probably not. We watch them.
  • Is someone watching who tries to log into your email, make changes to your files, change email rules, and other sneaky stuff that nobody wants to care about? We watch them and report on them with bleary, bloodshot eyes.
  • Are you tangled in Magento, CMS, practice management, or other customized settings? We fix it.
  • Are your backups and data flows configured to optimally reduce costs, reduce compliance burdens, and meet business and compliance requirements? You'll never guess, but yeah, we do that too. We make sure you build a bigger pile of gold without having to carry it.

Some of the systems we support

  • Adobe
  • Axcient
  • AWS
  • Azure
  • BitWarden
  • Cloudflare
  • GoDaddy
  • Google Workspace
  • Datto
  • Hubspot
  • LastPass
  • LinkedIn
  • Magento
  • Meta
  • Microsoft 365
  • QNAP
  • Synology
  • WordPress.

Cloud Solutions

The CyberGnome team loves rules and excels at credit card, privacy, health, finance, money services, government, military, and energy compliance. CyberGnome protects the data of accountants, doctors, fintech, and more.

There are more rules governing your credit cards, data residency, and personally identifiable information than many businesses understand. We will ensure you meet your credit card compliance regulations and manage your privacy obligations strategically before the PCI sheriff and privacy commissioner come to town.

The CyberGnome team is uber-experienced in high-control environments such as healthcare and NERC, meaning that no matter what type or size of business you own, CyberGnome manages your company's data to the highest standards in the IT industry.

FireWalls

The team at CyberGnome knows that firewalls, services, and change management are powerful tools that can either work for you or turn against you. To keep your business running smoothly, we proactively stay ahead of updates, watch your firewall, cloud services, networks, and computers, organize changes for minimal disruption, and deploy patches without reboots when we can so you can stay focused on what you do best.

The team at CyberGnome also knows that Change Management can be its own beast that needs to be handled with care and attention; we ensure that as your business grows, you can maximize your tools and keep IT from slowing you down.

PCI and Privacy Requirements

The CyberGnome team loves rules and excels at credit card, privacy, health, finance, money services, government, military, and energy compliance. CyberGnome protects the data of accountants, doctors, fintech, and more.

There are more rules governing your credit cards, data residency, and personally identifiable information than many businesses understand. We will ensure you meet your credit card compliance regulations and manage your privacy obligations strategically before the PCI sheriff and privacy commissioner come to town.

The CyberGnome team is uber-experienced in high-control environments such as healthcare and NERC, meaning that no matter what type or size of business you own, CyberGnome manages your company's data to the highest standards in the IT industry.

Backup & Business Continuity

Backup tapes and external hard drives don't cut it anymore. Most businesses can't wait days or weeks to recover systems after a ransomware attack or hardware failure -- if the backups work at all. Entire cities destroyed by fire and flood are also a good reminder that businesses can lose everything by storing backup tapes and external hard drives in local facilities or a business owner's home.

In general, we recommend systems that meet the following criteria:

  • Automatic real-time backup
  • Data automatically stored in a place with different natural threats (e.g. Calgary and Toronto)
  • Keep data from crossing international borders
  • Automatic detection and response to ransomware & cryptomalware
  • Automatic version control with previous hourly, daily, weekly, and monthly backup rotation
  • Version and date-based backups for Office 365 and Google gSuite systems
  • Instant local and remote failover for business-critical systems
  • Immediate access to backed up data
  • Encryption of backups in transit and at rest
  • Storage strategy based on business impact assessment (BIA)
  • Regular testing of recovery and failover processes
  • Annual third-party assurance over data centres, such as the Service Organization Control 1 (SOC1) reporting standards set forth in the Canadian Standard of Assurance Engagements (CSAE 3416).

We provide custom solutions and backup appliances that automatically replicate your systems to appliances on your site as well as secure SOC1-certified facilities in Toronto and Calgary.

We also provide always-on cellular Internet backup routers and self-healing wireless mesh access points.

The Datto Networking Appliance provides:

  • Fully integrated 4G LTE Internet failover with no additional contract or overage charges
  • Integrated firewall with intrusion detection and prevention
  • High performance edge router with 1.7Gbps of throughput (firewall only, 661Mbpz with IPS, 730Mbpx Internet mix)
  • Client and site-to-site VPN
  • NAT, stateful packet inspection, port forwarding, DMZ
  • Protocol analysis, port scanning, signature-based rules, web filtering, whitelisting, ad blocking
  • QoS traffic shaping
  • 6 built-in 10/100/1000 Ethernet ports, 2 dedicated WAN ports, 4 configurable VLAN ports
  • 3x3 MIMI AC Type 2.4/5GHz WiFi
  • Cloud management

Audit Preparation

Audits can be stressful -- but preparing for an audit can be even more trying. The easiest way to get through it is to have an auditor on your side.

In addition to operational expertise and experience, our certified NERC and PCI professionals are also Certified Information Systems Auditor with audit experience.

At your option, our process can cover all of your compliance requirements supplemented by best practices and an assessment of any additional vulnerabilities using a combination of audit control frameworks, experience, and automated processes.

Audit evidence is encrypted in storage and in transit. As an additional security measure, each piece is stored separately and associated with your account only through slow hashes.

Audit Types:

  • PCI: Payment Card Industry credit card compliance for merchants and websites.
  • NERC CIP: Critical Infrastructure Protection for the electrical industry. We specialize in WECC requirements.
  • PII: Personally-Identifiable Information and Privacy
  • General Controls Review: A flexible scope based on your specific needs, and our proven processes.

The CyberGnome Advantage

Every business deserves enchanting, seamless IT management that feels like magic. Elevate your business with CyberGnome, the premier choice for top-tier IT support and advanced cybersecurity.

Whether you face the most complex IT challenges or are a smaller business that doesn't want to worry about their IT security, CyberGnome delivers excellence tailored to your unique needs.

Trust us to safeguard your business and provide unparalleled support. Choose CyberGnome – your ultimate partner in IT and cybersecurity.

SUMMON THE CYBERGNOME