Pro Package


After effective planning, education, and training, you are ready for our Pro package.  This is where the team at eFence really shines.  Every facet of our Cybersecurity training is showcased in the Pro package.

Physical security is your first line of defense, our eFence team will discuss how to use physical barriers to thwart an attack.  Your company chose each staff member for their talents and trustworthiness, and most team members have multiple talents.  We know the intangibles that are required to defend our nation’s most closely held secrets.  Let us identify the team members who have those types of intangibles that already work for you.  Let’s be clear, we don’t suggest that the Assigned Security Team physically defend your company, instead, their role is to keep Security top of mind and benefit your company by maintaining the “Security First Mindset”. They will also have a role, described later, during an Incident (like hacking) and during a Recovery event (like a tornado). This includes being the Point-of-Contact (POC) for network security.  The POC will receive extra training in this role.

Security Keys, or “Tokens”, are the best type of 2-Factor Authentication.  Even if a Hacker knows a Username and Password they are out of luck when your company implements Security Keys for your staff.  In fact, after Google handed employees a security key in place of passwords and one-time codes (OTC) like the ones featured by RSA, none of their 85k employees were compromised. We’ve been using “Tokens” for many years and now you can too!

Physical security, security-minded personnel, and Tokens are just three layers of an effective “Multi-Layered Defense”.  Secured devices and an effective User Access policy are another.  Let our team train your team on how to implement Active Directory group policy to add security.

Finally, no comprehensive security posture is complete without the Incident and Disaster Recovery Plans in place.  The Business Continuity Plan documents the security posture and plans for recovery. In the Pro Package, eFence takes it one step further by naming the individuals on the Assigned Security Team who are the POC’s during an Incident and during the Recovery. They will be tasked with performing prescribed actions if an event does occur.



Services_Chart_09_21.jpg