Email Support contact@SFLCSI.com
Call Support 561-277-8347
Like Us on Facebook Follow us on Twitter Email Us

Managed IT Service Plans

Hackers are everywhere. They can strike anywhere, anytime, and in any number of ways. They don’t take days off, and while some do it for money, some do it to cause chaos, and some just do it because they can, the end result is the same. Your company loses money, data, credibility, customers lose faith in your business and take their hard-earned money elsewhere. As a result, most small businesses don’t survive a hack or a data breach. In fact, the average cost to a small company to recover operations, and then get back on its feet is approximately $2,300,000 according to the latest FBI statistics.

This is why in the 21st century, with our world so interconnected and dependent on computers, smart phones, the Internet, and other high tech devices, preparing your company’s systems and digital infrastructure is more important than ever. Let South Florida Cybersecurity Investigations take all the anxiety, stress, and pressure off your business, and let us handle your cyber security needs for you. We’ve partnered with Continuum IT Management, an award winning worldwide leader in remote IT management services, and are pleased to offer Cyber Security Managed IT Service Plans (MSP’s) to our business customers. We also offer US-Based Computer Help Desk Services and Security Operations Services with several tiers, all for a price that won’t break the bank.

You may be asking yourself, what sets us apart from other businesses claiming they can help protect you? Simple, as Ethical “White Hat” Hackers, we know the best way to level the playing field is to fight fire with fire, and to check the very things hackers would look for in order to break in, and we even use the same software and tricks, but in this case, we do so do protect your business against hackers and other cyber criminals. We know from experience that those free antivirus programs and firewalls most small businesses download and use can often be woefully inadequate, since all it takes is one malicious phishing email to slip through, have one person click the link and compromise all your systems, infect it with malware, ransomware, and who knows what else. And more and more viruses are programmed to shut down basic antivirus programs the moment the computer is infected. What’s worse is, fully 70% of cyber security incidents occur because of internal security issues caused by your own staff due human error or deliberate action, and the percentage is growing every year. This is why we use software that not only scans and patrols your network and servers for anything out of the ordinary, it also looks out for activity that your staff on the inside is doing, as well as any ne’er-do-well’s on the outside are attempting.

Why would we do all this? You also might be thinking why your own IT staff can’t do this. The answer is simple and several-fold. Firstly, it’s considered a conflict of interest to have your in-house IT staff check how good it’s cyber security stance is, for the same reason a lawyer can’t grade his own Bar exam, or a general contractor can’t inspect a building his company just finished. Secondly, most IT technicians, while they may be perfectly competent in hardware, programming, networking, and installation, aren’t necessarily qualified in cyber security. They’re usually swamped with calls and tickets from their users to install a mouse, fix a printer, replace a monitor, update Microsoft Office on a hundred computers, put a 2nd hard drive in the boss’ computer, get that PowerPoint presentation done yesterday, and then maybe they can take a 5-minute breather to down a soda and a bag of chips. Sometimes they can even be the cause of the problem.

Case in point, Equifax suffered a serious data breach in 2017, with over 143 million personal records being compromised, including people’s names, birthdays, SSN’s, addresses, private financial documents, and other personal information, all because a single IT tech didn’t install one patch on a single server, leaving it vulnerable to attack by hackers. The hackers had their way with Equifax’s systems for 76 straight days before anyone at the company even noticed anything was wrong. Management compounded the issue by failing to notify the public for six weeks once the breach was finally discovered, but the root cause was clear, it was human error, plain and simple. Despite it being over a year since the incident took place, the cost to Equifax has been massive at over $500 million and counting.

OK, let’s get down to brass tacks here. How much does something like this cost? Here’s a handy chart with all the tiers we offer

Desktops & Laptops

  Total Desktop Care   Help Desk  
Included Features (Rate is per workstation per month) Desktop Business Hours After Hours 24 x 7
Hardware & Software audits X X X X
Performance & Preventive Maintenance Reports X X X X
LogMeIn Pro Remote Control X X X X
Patching X X X X
Antivirus management X X X X
Web-based portal X X X X
Self-help center X X X X
EMSISoft Antivirus X X X X
EMSISoft Anti-Malware Anti-Ransomware Support X X X X
Help Desk Coverage 8am-6pm 5pm-9am 24 x 7
Windows, Mac & Mobile Support X X X
Virus & Malware Removal X X X
Software installation X X X
Pricing $12.00 $30.00 $25.00 $37.50

Servers & Mobile Devices

Package

                                              

Silver Gold Platinum
Anti Virus (EMSISoft) (Includes (Anti Ransomware, Anti Malware, Anti Phishing) X X X
Remote Access (LogMeIn Pro) X X X
Patching 10 Hours/Month 30 Hours/Month 50 Hours/Month
24/7 Monitoring X X X
Patching X X X
On-site Visits Up to 2 Visits/Month Up to 3 Visits/Month

(additional visits- $250/hour/visit)

Up to 5 Visits

(additional visits- $150/hour/visit)

Troubleshooting 10 hours/month 25 hours/month 50 hours/month
Emergency Services Response within 72 hours           48 hours 12 hours
Mobile Device Management X X
Pricing $35.00 $55.00 $85.00
  • For 24/7/365 Security Operations Center Monitoring, add $10 to both Desktop and Server Packages
  • Volume discounts are available
  • For Additional Mobile Devices, add $15 per device per month

When you add the Security Operations Center Monitoring to your computers, servers and network, we will perform and monitor for:

  • Weekly reports on the health of your systems
  • Regular checks of firewalls and antivirus system
  • Regular checks for missing updates and patches that require installation
  • Alert notifications of attempted intrusions, plugging in of unauthorized thumb drive, new profiles suddenly added, etc.
  • Reports of unauthorized logins
  • Reports of logins at odd or unauthorized days and times
  • Attempted access to unauthorized website(s)
  • Reports of attempted logins to restricted computers/servers
  • Notifications of unauthorized programs or installations/attempts
  • Scans for Personally Identifiable Information (PII) or Personal Health Information (PHI) where it shouldn’t be
  • Regular reports on weaknesses that need to be updated by your IT department
  • Reports of unusual or unauthorized elevation of user access, such as granting of administrative rights
  • Alerts of unauthorized connection attempts to Wi-Fi
  • The list goes on…

This is also a partial list of some of the regular scans we perform:

  • User accounts that have passwords that never expire
  • User accounts with passwords that don’t comply with company password policy, or weak passwords that can be easily cracked
  • User Account Lockout Policy
  • User login history
  • Security Groups in Active Directory
  • Network share access by user and by computer
  • Anomolous Logins
  • Checking Operating System version
  • Checking router and network for open/vulnerable ports
  • HIPAA Compliance (for medical clinics and hospitals)
  • PCI Compliance (for retail and other businesses that process credit card transactions)