Security Assessment
Know your risk and learn what to do next!


Is your company getting or performing security assessments? At RCC, we have a system where we learn about your business and then look at alignment with the best practices and standards applicable to your company’s needs.

RCC performs risk interviews on current user policies, on-site collection of data relating to firewalls, network security features, BDR systems, and remote access pathways. We deliver an executive summary comprised of your business standards and feedback on initiatives to pursue and achieve your business technology goals.

RCC will provide a gap analysis indicating what components of your security are the most effective and resolving areas in need of additional protection. One of the key objectives of a gap analysis is a comprehensive image of your current information security landscape, providing priority zones for maximum advantages.  Therefore, our centralized services can shift the focus to the areas of your security that require the most attention from our team.

This security assessment is free to current MSP clients, so talk to our experts today and get on track with world-class IT systems management.

9 Best Security Practices to Reduce your Ransomware Risk

Provide Security Awareness Training

Almost 90% of ransomware attacks are the result of user error. Security awareness training is inexpensive, and immediately available. However, it requires a commitment to allocate 1-2 hour per month per employee to benefit from the training system.

Create an Incident Response Plan

By creating an incident response plan, you become ready for an attack. You ask and answer questions at a non-stressful time. The alternative is to do so, when stress levels are at a maximum and you extend the risk and exposure to greater business interruption.

Get a Vulnerability Assessment

It is important to have an accurate look at exactly what is going on with your network. An outside professional assessment that investigates all the traffic and policies across your specific network, will provide you with a clear path on what exposure you have to attacks and where it is. Thereby allowing defenses to be put in place at exactly the most vulnerable of locations.

Establish a Modern Backup Strategy

Backup strategies and systems of just 1-2 years ago, can be ineffective against todays attacks. Your company needs a backup and restore strategy that provides for a high level of confidence in the ability to provide business continuity in the event of a breach.

Get Expert Advice

Your business network security is not a DIY project. Hire an industry expert or team to act as consultants and make sure the decisions you make represent CURRENT best practices.

Patch Systems Regularly

The most significant defense for hardware items it to have an aggressive patching program. The bad guys work diligently to know how to compromise unpatched hardware. Different rhythms make sense for different hardware devises.

Create Strong Password Policies

With passwords, convenience and security are opposing concepts. Users today need education to understand why password policies are necessary and that without them you may leaving the barn door open for attacks.

Use Multifactor Authentication

Multifactor authentication adds an additional layer or protection against compromised credentials. Multifactor authentication is typically implemented with a SMS message upon login attempt to the user with a code that needs to be entered to proceed. Or biometrics data (fingerprint, etc.) to validate the login.

Install “Next-Gen” Antivirus Software

Antivirus software has changed over time. “Next-Gen” systems offer a significant higher performance and protection compared to legacy style software.