Houston (832) 466-3236   |      Dallas/Ft. Worth (972) 823-4000   |      Austin (512) 642-5001

How secure is your small business from cyber threats?

Small businesses are now the target for over 60% of all cyber security attacks.

It doesn’t make any difference if you’re a small, medium, or large business. You are vulnerable as well as all the records you retain for your customers, employees and vendors. Your odds of being hacked are very good; just one single successful cyber attack can put you out of business and set you up for legal ramifications.

Protect your business from cyber attacks.

According to Caleb Barlow, Vice President – IBM Security, cybercrime netted a whopping $450 billion in profits in 2015, with 2 billion records lost or stolen worldwide. That’s staggering.

As technology gets smarter, so do hackers. Cyber attacks on large companies make big headlines, however, attacks on small businesses are getting far more prevalent. Most small businesses are unprepared to deal with cyber security threats, leaving them especially vulnerable.

TechOne Centre’s IT Security Service is your company’s ultimate ally against cybercrime.


Internet Penetration Test

A penetration test, colloquially known as a pen test, is an authorised simulated attack on a computer system that looks for security weaknesses, potentially gaining access to the system’s features and data.

The process typically identifies the target systems and a particular goal—then reviews available information and undertakes various means to attain the goal. A penetration test target may be a white box (which provides background and system information) or black box (which provides only basic or no information except the company name). A penetration test can help determine whether a system is vulnerable to attack, if the defenses were sufficient, and which defenses (if any) the test defeated.

Security issues that the penetration test uncovers should be reported to the system owner. Penetration test reports may also assess potential impacts to the organization and suggest counter measures to reduce risk.

The goals of a penetration test varies depending on the type of approved activity for any given engagement with the primary goal focused on finding vulnerabilities that could be exploited by a nefarious actor, and informing the client of those vulnerabilities along with recommended mitigation strategies.

Penetration tests are a component of a full security audit. For example, the Payment Card Industry Data Security Standard requires penetration testing on a regular schedule, and after system changes.

Information Technology Security Assessments

Information Technology Security Assessment (IT Security Assessment) is an explicit study to locate IT security vulnerabilities and risks.

In an assessment, the assessor should have the full cooperation of the organization being assessed. The organization grants access to its facilities, provides network access, outlines detailed information about the network, etc. All parties understand that the goal is to study security and identify improvements to secure the systems. An assessment for security is potentially the most useful of all security tests.

The goal of a security assessment (also known as a security audit, security review, or network assessment, is to ensure that necessary security controls are integrated into the design and implementation of a project. A properly completed security assessment should provide documentation outlining any security gaps between a project design and approved corporate security policies. Management can address security gaps in three ways: Management can decide to cancel the project, allocate the necessary resources to correct the security gaps, or accept the risk based on an informed risk / reward analysis.

The following methodology outline is put forward as the effective means in conducting security assessment:

  • Requirement Study and Situation Analysis

  • Security policy creation and update

  • Document Review

  • Risk Identification

  • Vulnerability Scan

  • Data Analysis

  • Report & Briefing

Security Assessment Report should include the following information:

  • Introduction/background information

  • Executive and Management summary

  • Assessment scope and objectives

  • Assumptions and limitations

  • Methods and assessment tools used

  • Current environment or system description with network diagrams, if any

  • Security requirements

  • Summary of findings and recommendations

  • The general control review result

  • The vulnerability test results

  • Risk assessment results including identified assets, threats, vulnerabilities, impact and likelihood assessment, and the risk results analysis

  • Recommended safeguards

Learn how to protect your business from cybercrime

Small businesses are now the target for over 60% of all cyber security attacks. It doesn’t make any difference if you’re a small, medium, or large business. You are vulnerable as well as all the records you retain for your customers, employees and vendors. Your odds of being hacked are very good; just one single successful cyber attack can put you out of business and set you up for legal ramifications.

Make plans now to attend this two-part series where you will walk away armed with specific actions you can take to protect your business, your clients, your vendors, and your family from cybercrime. This is a non-technical workshop presented in plain English for small businesses of all types.

All participants will receive The Small Business Cybersecurity Workbook , access to online resources gathered, and curated by the SBDC, as well as a Certificate of Completion.

Seminar Highlights

  • Issues driving cybercrime

  • Factors affecting how your technology gets compromised

  • Critical steps to take to protect your business

  • Understanding the terminology

  • Tips and techniques for making passwords easy and secure

  • Building the human firewall with your team

  • Securing wireless networks

  • Using cloud computing

  • Understanding the “Internet of Things” and it’s vulnerability

  • Small business do’s and don’ts for cybersecurity

  • Firewalls, encryption, social engineering, two-factor authentication, and phishing

Real World Cybersecurity for Your Small Business

3/21/2017 & 3/23/2017
9:00 AM – 1:00 PM
Location: UH Bauer College SBDC
2302 Fannin, Suite 200
Houston, Texas 77002

CV Rao, President & Chief Technology Officer, TechOne Centre


Target audience:

This workshop is especially valuable to any business owner concerned about cybercrime and how to protect itself.  It is especially helpful for businesses who work with large corporations, government entities, and in other regulated industries such as finance, legal, and healthcare.



This workshop is 2 sessions for a total of 8 hours. The price includes both sessions.

Workshop dates – each session is from 9:00 a.m.-1:00 p.m.:

Tuesday, February 21 and Thursday, February 23

Total Device Management and Security in the Cloud

The MaaS360 platform offers something no other vendor does; true software-as- a-service (SaaS) that delivers instant business mobile device (MDM), application (MAM), document and expense management—all from a single screen.

Built on a secure, multi-tenant cloud architecture, MaaS360 enables instant business mobility management in just minutes with effortless scalability, whether from ten to 100,000 users, and seamless integration into existing business systems. And because there are no servers to install, upgrades to the latest technology are automatic. Affordability is unmatched with no upfront costs and no expensive change management.

Multi-Platform Device Management

Founded in 1992, FileWave provides business, education and government institutions from around the world with enterprise level multi-platform systems and mobile device management. See how FileWave’s products and features provide a comprehensive solution throughout the entire life cycle process of imaging, deployment, management and maintenance.

You can use FileWave to manage iOS and Android devices within the same interface you use to manage your Mac and Windows clients. FileWave supports Apple’s Mobile Device Management (MDM). Its Layered and Institution models and Configurator provide seamless integration for app and profile deployment, resetting passwords, data protection, remote wipe, inventory reporting and more.

Apple Device Management

Bring the legendary Apple experience to your organization. Whether you have ten or ten thousand devices, JAMF helps you empower your end users to be more creative, productive, and happier—all while making your life easier.

For Enterprise:
Empower employees and increase productivity with streamlined Apple device management.

For Small Business:
Help your small or inexperienced IT staff do more with Apple through simplified management.

For K-12 Education:
Personalize the classroom experience with better access to rich educational resources.

For Higher Education:
Maintain institutional security protocols and protect sensitive staff and student information.


Free your time and start focusing

on your business now!

We’ll take care of the rest.

New to site? Create an Account


Lost password?

Already have an account? Login