Slide 1 — Cover
d
1 / 15
Slide 2 — What Sets Us Apart
Help Desk
···
Centralized Services
···
Projects
···
Technology Alignment
+
CIO
Most IT Providers
2 / 15
Slide 3 — Our Services

Help Desk:

  • Remote Support
  • Onsite Service
  • User On/Off Boardings
  • Hardware Assistance

Professional Services/Projects:

  • New Office Buildout
  • New Data or Email Migration
  • New Security Solutions

Centralized Services:

  • Monitoring
  • Patch Management
  • Automation
  • Backup & DR
  • Security
3 / 15
Slide 4 — Technology Alignment + CIO
Most IT Providers say they do this…

Technology Alignment:

Standards Library
Compliance
Alignment Review

- - - - -

CIO:

Impact Assessment
Business impact of technology
Strategic Roadmap w/Budget

4 / 15
Slide 5 — Technology Alignment

Technology Alignment

5 / 15
Slide 6 — Our Pillars

Chess board image
(upload to WordPress Media Library)
Help Desk
CIO
Centralized Services
Technology Alignment
Professional Services
6 / 15
Slide 7 — CIS IGI Assessment
CIS | IGI | Assessment
d
SUMMARY:
The overall summary report provides an overall score for each of the categories designed to show the overall health and compliance of your IT systems. Scores are weighted based on their respective importance to keeping your business in optimal range.
CategoryScore
Control 01: Inventory and Control of Enterprise Assets33
Control 02: Inventory and Control of Software Assets44
Control 03: Data Protection39
Control 04: Secure Configuration of Enterprise Assets and Software56
Control 05: Account Management58
Control 07: Continuous Vulnerability Management73
Control 06: Access Control Management67
Control 08: Audit Log Management33
Control 09: Email and Web Browser Protections67
Control 10: Malware Defenses56
Control 11: Data Recovery33
Control 12: Network Infrastructure Management33
Control 14: Security Awareness and Skills Training33
Control 15: Service Provider Management100
Control 17: Incident Response Management33
BASIC CYBER HYGIENE
IG1
IG2
IG3
7 / 15
Slide 8 — Category: Security
Category: Security
d
ItemScore
DMARC, SPF, DKIM, are enabled for all email domains in use.At Risk
Email encryption is available for users that need it and documentation is available on how to use.At Risk
Two Factor authentication is being used for files and Email?At Risk
Two factor authentication is being used for all cloud based critical systems.At Risk
User accounts for former employees are closed and/or have passwords changed.Needs Attention
Do all end user devices have encryption enabled.At Risk
Are there users which have admin rights on their computers?Unknown
Does the Wi-Fi network have radius enabled and is on its own subnet - providing an isolated subnet for guests?Needs Attention
Staff are provided on-going security awareness training & testing.At Risk
8 / 15
Slide 9 — Technology Success Journey
I
🧩
II
🔵🔴
III
🟦🟥🟨
IV
🏠
Technology
Alignment
Technology
Success
CIO
9 / 15
Slide 10 — Dedicated Roles and Positions
Dedicated Roles and Positions
Help Desk
👤
👤
👤
👤
👤
👤
👤
👤
👤
👤
Centralized Services
👤
Projects
👤
👤
👤
👤
Technology Alignment
👤
👤
👤
👤
👤
+
CIO
👤
👤
10 / 15
Slide 11 — SOC 2 Compliance

● Access Control

● Two-Factor Authentication

● Encryption

● Encryption

● Access Controls

● Network/Application Firewalls

SECURITY AVAILABILITY PROCESSING CONFIDENTIALITY PRIVACY
SOC 2

● Two-Factor Authentication

● Network/Application Firewalls

● Intrusion Detection

● Performance Monitoring

● Disaster Recovery

● Security Incident Handling

● Quality Assurance   ● Process Monitoring

11 / 15
Slide 12 — Who Are Our Clients?
Who are our Clients?
THE POPULAR CENTER FOR DEMOCRACY
NYCLU
New York Civil Liberties Union
▲ TAKEROOT JUSTICE
GREAT BOWERY
URBAN JUSTICE CENTER
OLIVER SCHOLARS
opportunity unlocked
MOBILIZATION FOR JUSTICE
VOLS
LEGALMOMENTUM®
50 Clients
$5,300 AVG Monthly Recurring Engagement
50 Employees is the Average Size
500 Employees is Our Largest Client
12 / 15