SECURE — CYBERSECURITY
Security that's sized to the business — not a Fortune 500 deck.
Most SMB breaches don't come from sophisticated attackers — they come from MFA gaps, stale accounts, missing backups, and unpatched edge devices. We close those first.

- 01
Identity & access hardening
MFA everywhere, SSO where it pays off, conditional access, privileged-account hygiene, and an offboarding process that actually completes.
- 02
Endpoint protection (EDR)
Modern EDR rolled out across Mac, Windows, and Linux fleets — with someone watching the alerts and tuning the noise.
- 03
Backup & recovery integrity
3-2-1 backups for endpoints, servers, and SaaS. Tested restores, not just green checkmarks in a dashboard.
- 04
Network & perimeter hardening
Segmented VLANs, sane firewall rules, VPN/zero-trust where appropriate, and Wi-Fi that doesn't double as guest internet.
- 05
Phishing & user risk reduction
Targeted simulations, short training, and processes that don't rely on people being perfect at 4:55pm on a Friday.
- 06
Incident readiness
A short, written response plan: who calls whom, what gets isolated, where logs live, and how you'd recover by Monday.
INCIDENT RESPONSE · WORKED EXAMPLE
What the first 24 hours actually look like.
Detect
EDR or user report fires the playbook. On-call paged.
Isolate
Affected hosts quarantined, credentials rotated, logs preserved.
Triage
Scope confirmed, comms drafted, restore plan staged.
Recover
Clean restore from tested backups, post-incident review scheduled.