As A Service Security

I talk a lot about what you need to do in order to stay safe…

  1. Backups

  2. Patching and Updates

  3. Stronger Authentication

  4. Cyber Security Insurance

  5. Move to the cloud

But I don’t really point you guys in directions where to look.  The following are examples of companies you can work with to do the “As A Service” thing.  They are not recommendations, but rather just starting points.



Wolf Technology Group

Patching and Updates



Stronger Authentication



Cyber Security Insurance



Move to the Cloud & Have a Plan

This is a bit more tricky.  This really is more of a direct professional services gig to help you come up with a plan.  If you would like a quick chat the help point you in the right direction, schedule a 30 min call with me and we will talk through it.

Book a Free Consult

I hope this helps!  Remember, following my 5 points wont make you safe, it’ll make you safer and so you can recover.  If you really need tighter security, the best thing you can do is work with a professional cyber security consultant who can perform an audit, build you a plan, and help you execute on it.

Adam Anderson

Adam Anderson is the author of Built to Survive: A Business Person's Guide on How to Recover and Thrive After a Cyber Attack. Adam’s 15 years of entrepreneurial startup experience and his knowledge Enterprise Cyber Defense gives him a window into what’s wrong with communication between large and small companies. He combined this knowledge and the good works from the National Institute of Standards and Technology’s Cyber Security Framework to co-author the book “Small Business Cyber Security”. This book was later turned into an online class by Clemson University. Adam has been active in peer advisory boards for small business CEOs. He took this experience and co-founded a peer advisory board for Chief Security Officers of fortune 500 companies. This mix of small and large businesses has positioned Adam as one of the few people in the world to understand the complete supply chain of cyber security.
Posted in