Houston (832) 466-3236   |      Dallas/Ft. Worth (972) 823-4000   |      Austin (512) 642-5001

How secure is your small business from cyber threats?

Small businesses are now the target for over 60% of all cyber security attacks.

It doesn’t make any difference if you’re a small, medium, or large business. You are vulnerable as well as all the records you retain for your customers, employees and vendors. Your odds of being hacked are very good; just one single successful cyber attack can put you out of business and set you up for legal ramifications.

Protect your business from cyber attacks.

According to Caleb Barlow, Vice President – IBM Security, cybercrime netted a whopping $450 billion in profits in 2015, with 2 billion records lost or stolen worldwide. That’s staggering.

As technology gets smarter, so do hackers. Cyber attacks on large companies make big headlines, however, attacks on small businesses are getting far more prevalent. Most small businesses are unprepared to deal with cyber security threats, leaving them especially vulnerable.

TechOne Centre’s IT Security Service is your company’s ultimate ally against cybercrime.


University of Houston Small Business Development Center Seminars

Seminar Event Location Date Time Price
Protecting Your Business Data UH Bauer College SBDC May 23, 2017 9:00 AM – 11:00 AM Free Register
How Secure Is Your Business From Cyber Threats Brenham Fireman’s Training Center June 7, 2017 10:30 AM – 11:00 AM $49  Register
Data Protection for Your Business (2 for 1 Special Offer) UH Bauer College SBDC June 22, 2017 9:00 AM – 4:00 PM $19.00 Register

Small businesses are now the target for over 60% of all cyber security attacks.  It doesn’t make any difference if you’re a small, medium, or large business. You are vulnerable as well as all the records you retain for your customers, employees and vendors. Your odds of being hacked are very good; just one single successful cyber-attack can put you out of business and set you up for legal ramifications.

Make plans to attend one of our seminars. You  will walk away armed with specific actions you can take to protect your business, your clients, your vendors, and your family from cybercrime.  This is a non-technical workshop presented in plain English for small businesses of all types.

Internet Penetration Test

A penetration test, colloquially known as a pen test, is an authorised simulated attack on a computer system that looks for security weaknesses, potentially gaining access to the system’s features and data.

The process typically identifies the target systems and a particular goal—then reviews available information and undertakes various means to attain the goal. A penetration test target may be a white box (which provides background and system information) or black box (which provides only basic or no information except the company name). A penetration test can help determine whether a system is vulnerable to attack, if the defenses were sufficient, and which defenses (if any) the test defeated.

Security issues that the penetration test uncovers should be reported to the system owner. Penetration test reports may also assess potential impacts to the organization and suggest counter measures to reduce risk.

The goals of a penetration test varies depending on the type of approved activity for any given engagement with the primary goal focused on finding vulnerabilities that could be exploited by a nefarious actor, and informing the client of those vulnerabilities along with recommended mitigation strategies.

Penetration tests are a component of a full security audit. For example, the Payment Card Industry Data Security Standard requires penetration testing on a regular schedule, and after system changes.

Information Technology Security Assessments

Information Technology Security Assessment (IT Security Assessment) is an explicit study to locate IT security vulnerabilities and risks.

In an assessment, the assessor should have the full cooperation of the organization being assessed. The organization grants access to its facilities, provides network access, outlines detailed information about the network, etc. All parties understand that the goal is to study security and identify improvements to secure the systems. An assessment for security is potentially the most useful of all security tests.

The goal of a security assessment (also known as a security audit, security review, or network assessment, is to ensure that necessary security controls are integrated into the design and implementation of a project. A properly completed security assessment should provide documentation outlining any security gaps between a project design and approved corporate security policies. Management can address security gaps in three ways: Management can decide to cancel the project, allocate the necessary resources to correct the security gaps, or accept the risk based on an informed risk / reward analysis.

The following methodology outline is put forward as the effective means in conducting security assessment:

  • Requirement Study and Situation Analysis

  • Security policy creation and update

  • Document Review

  • Risk Identification

  • Vulnerability Scan

  • Data Analysis

  • Report & Briefing

Security Assessment Report should include the following information:

  • Introduction/background information

  • Executive and Management summary

  • Assessment scope and objectives

  • Assumptions and limitations

  • Methods and assessment tools used

  • Current environment or system description with network diagrams, if any

  • Security requirements

  • Summary of findings and recommendations

  • The general control review result

  • The vulnerability test results

  • Risk assessment results including identified assets, threats, vulnerabilities, impact and likelihood assessment, and the risk results analysis

  • Recommended safeguards

Total Device Management and Security in the Cloud

The MaaS360 platform offers something no other vendor does; true software-as- a-service (SaaS) that delivers instant business mobile device (MDM), application (MAM), document and expense management—all from a single screen.

Built on a secure, multi-tenant cloud architecture, MaaS360 enables instant business mobility management in just minutes with effortless scalability, whether from ten to 100,000 users, and seamless integration into existing business systems. And because there are no servers to install, upgrades to the latest technology are automatic. Affordability is unmatched with no upfront costs and no expensive change management.

Multi-Platform Device Management

Founded in 1992, FileWave provides business, education and government institutions from around the world with enterprise level multi-platform systems and mobile device management. See how FileWave’s products and features provide a comprehensive solution throughout the entire life cycle process of imaging, deployment, management and maintenance.

You can use FileWave to manage iOS and Android devices within the same interface you use to manage your Mac and Windows clients. FileWave supports Apple’s Mobile Device Management (MDM). Its Layered and Institution models and Configurator provide seamless integration for app and profile deployment, resetting passwords, data protection, remote wipe, inventory reporting and more.

Apple Device Management

Bring the legendary Apple experience to your organization. Whether you have ten or ten thousand devices, JAMF helps you empower your end users to be more creative, productive, and happier—all while making your life easier.

For Enterprise:
Empower employees and increase productivity with streamlined Apple device management.

For Small Business:
Help your small or inexperienced IT staff do more with Apple through simplified management.

For K-12 Education:
Personalize the classroom experience with better access to rich educational resources.

For Higher Education:
Maintain institutional security protocols and protect sensitive staff and student information.


Free your time and start focusing

on your business now!

We’ll take care of the rest.

New to site? Create an Account


Lost password?

Already have an account? Login