Workshops

Cyber Security 101 Briefing and Disaster Recovery

Learn about the latest threats to small businesses:
  • More and more companies are being breached on a daily basis. Regardless of the size of your business, if you don’t have a strong security posture, it’s not a question of IF you’ll get hacked, it’s a question of WHEN you’ll get hacked
  • One of the more crippling hacks organizations face is a Ransomware attack. Ransomware encrypts sensitive files then demands a ransom in exchange for the decryption key-usually in the form of prepaid cash cards or bitcoin(cryptocurrency). Malware, like CryptoLocker or Cryptowall, can be undetected on workstations for hours or even days before launching an attack
  • Symantec reports that almost half of cyber-attacks worldwide, 43%, last year were against small businesses with less than 250 workers
  • The securities and exchange commission reports that 60% of all cyber attacks targeted small-to-midsize businesses in 2014

Our managed security services deploys and integrates asset discovery, threat detection, vulnerability assessments, network analysis and reporting tools. Building these essential security controls in one solution saves you time, cost and the complexity of purchasing, configuring and integrating different data feeds and managing multiple consoles.

Disaster Recovery (BDR)- the ability to recover and restore core business data/systems during an unexpected outage
  • Is your data protected from a technical or natural disaster?
  • Could you continue to run your business without your data or applications?
  • When was the last time your backup and disaster recovery plan was fully tested?
  • Do you have a realistic and accurate time frame for restoring your network if the worst case scenario does happen?

CornerstoneIT can help you manage your risks, evaluate your needs, and design the best managed solution for your business.


MAR
24

3:00pm - 5:00pm
REGISTER

Office 365- Skype for Business Hosted VoIP

At the heart of Office 365 Communications is the Skype for Business service connecting your teams with the experience they love, in the Office applications they use every day. With Skype for Business you can simplify your infrastructure with one platform for calling, conferencing, video, and sharing.

Skype across Devices

Connect with your team anywhere using our mobile apps across Windows, iOS and AndroidTM, or bring remote participants into meeting spaces of all sizes with Skype for Business Room Systems.

Complete Meeting Solutions

Work like you are all in one room, even when you are not. From collaborative team sessions to large broadcasts or dialing into a conference using your phone, Skype for Business is designed for all your meeting needs.

Modern Voice with Cloud PBX

Make, receive, and transfer business calls in the office, at home, or on the road using phone, PC, and mobile. Increase agility and consolidate management with voice services in Office 365.

Security, Control and Compliance

Get end-to-end security, control and compliance that span from the user to the enterprise. All powered by the on-demand scale and manageability of Office 365.

We help our customers along all the steps of the productivity improvement journey, starting with deployment planning and roll-out, to making sure your teams are up to speed with the new solution and comfortable enough with the new ways of communication


APR
28

3:00pm - 5:00pm
REGISTER

Cyber Security 101 Briefing and Threat Detection

Learn about the latest threats to small businesses:
  • More and more companies are being breached on a daily basis. Regardless of the size of your business, if you don’t have a strong security posture, it's not a question of IF you’ll get hacked, it's a question of WHEN you'll get hacked
  • One of the more crippling hacks organizations face is a Ransomware attack. Ransomware encrypts sensitive files then demands a ransom in exchange for the decryption key-usually in the form of prepaid cash cards or bitcoin(cryptocurrency). Malware, like CryptoLocker or Cryptowall, can be undetected on workstations for hours or even days before launching an attack
  • Symantec reports that almost half of cyber-attacks worldwide, 43%, last year were against small businesses with less than 250 workers
  • The securities and exchange commission reports that 60% of all cyber attacks targeted small-to-midsize businesses in 2014

Our managed security services deploys and integrates asset discovery, threat detection, vulnerability assessments, network analysis and reporting tools. Building these essential security controls in one solution saves you time, cost and the complexity of purchasing, configuring and integrating different data feeds and managing multiple consoles.

What you need to know about Threat Detection: Real-time network scans allow for early detection of threats which can prevent malware from infecting other devices on your network

We deliver all the essentials for advanced complete security visibility, vulnerability assessment, intrusion detection, behavior monitoring and integrated threat intelligence:

  • Threat data detected every 30 minutes
  • Correlation and analysis of event data (threats and security breaches) from some of the best security analysts in world
  • Event correlation=accelerated incident response time from threats like Ransomware, CryptoLocker, and Cryptowall
  • Configuring and monitoring of all critical assets-employee information, customer information and intellectual property
  • File Integrity Monitoring (FIM)-detectecting changes in critical files
  • Alarms for assets under attack and how they are being attacked- users receive notifications when a bad actor is targeting the network.
  • Assisting in understanding attacker intent

MAY
12

3:00pm - 5:00pm
REGISTER