Frequently Asked Questions

BreachSecure CyberSecurity Training FAQs

What makes ThreatProtector’s training so different?

ThreatProtector looks at employee security training as a platform rather than just another thing they need to do. We provide cutting edge and relevant security training, dark web monitoring, phishing simulations, and real time threat assessments of each employee’s risk score. The only way to really know where the weak spots are in your organization is by putting all pieces together into one coherent platform.

Why do employees even need cybersecurity training?

Cybercriminals evolve at a pace that even a very savvy IT teams cannot keep up with.  Combine this with the fact that 70% of breaches happen because of an untrained employee and it makes for a recipe for disaster.  Criminals don’t care about what business you are in, how many employees you have, nor what your revenues are each year.  All they care about is extracting either data or money from you, it’s all business and your employees are on the front line of the fight.

What are the topics covered in your security training?

Security training needs to be directly focused at the end user. The goal should not be to make them an expert but instead, ensure that they are effectively trained against how criminals try to take advantage of them. Security topics include:

  • Phishing, SpearPhishing and Whaling
  • Social engineering tactics
  • Malware and ransomware
  • Effective password management
  • Portable devices and how to protect them
  • Physical access to locations
  • How to utilize data destruction efficiently
  • The importance of encryption
  • Data breach
  • Election Scams
  • USB devices and how they can be compromised

Of course, this is not an exhaustive list of all topics. We currently have over 200 different topics covered with your employees.

How do you calculate the employee security score?

The Employee Security Score (ESS) allows our customers to get real time threat assessments of each of their employees. Think of the ESS as a credit score that you would see when purchasing a home. The higher your score, the lower the risk. The ESS uses a sophisticated and proprietary algorithm to transform employee education into an analytical engine. By assigning an ESS to each user, employees can see where they fall in their peer group and in what areas they can improve. The ESS combines factors like scores on yearly certification quizzes, number of employee breaches found on the dark web, weekly micro training scores, phishing simulation failures, security policy acknowledgements and more to give you the data you need to understand where the risks lie in your organization.

How often should security training be given?

Many studies have shown that in order to optimize learning of your employees to conduct one yearly security training and then supplement that with weekly micro training sessions.

What are the consequences if I don’t have or provide inadequate security awareness training?

Inadequate training is the lowest hanging fruit for criminals. They know that most companies don’t spend a lot of time in this area, so it gives them a massive leg up on breaching your organization.

Do you offer HIPAA training along with the cybersecurity training?

Yes. If you are mandated to follow HIPAA guidelines, we can implement required HIPAA training along with the cybersecurity awareness modules. This HIPAA training will meet all guidelines set forth for your organization.
Inadequate training will also result in more data breaches in the long run. It’s inevitable. Your employees are the greatest security risk. Training is a great way to reduce that potential exposure. The sad thing is that there is no way to get the risk to zero, but because each person is a risk, you must take the time to implement a full strategy to enhance the “human firewall”

Is security awareness training required by law?

We would always say that whatever industry you are in, security awareness training is important regardless of laws. Your employees are the weakest link, you need to solidify this segment. Saying that, there are data security laws that dictate mandatory cybersecurity training, including: HIPAA Privacy Rules, Gramm-Leach-Billey Act (GLBA), Massachussetts Data Security Law, and the Federal Information Security Management Act (FISMA).

Does your platform scale up for very large organizations?

Our platform works for any organization regardless of size. Whether you are one-person shop or a Fortune 10, the platform scales seamlessly.

How is our data stored, and what precautions do you take to protect our data?
We use Amazon Web Services to host all servers and data on our platform. They are fully compliant and of course housed in ISO certified facilities. Please understand that there is no unauthorized external access to data and we only store the basic information needed to allow your employees to access the system. We don’t share information with any outside organizations and everything is held private at all times.

How much can I expect to pay for security training?

It’s important to understand that we sell a security training platform that includes multiple components on top of the standard education you see from the competition. We include security training, phishing simulations, dark web monitoring, security policy acknowledgments, yearly security audits and much more. All of this comes at a price per user that is very economical. To get more pricing: https://threatprotector.com/breachsecure-pricing/

Endpoint Essentials FAQs

What specifically does Endpoint Essentials cover?

Endpoint Essentials is a comprehensive IT platform that effectively secures business users and data while making systems more productive and reliable. We cover all MAC’s, PC’s and Servers from ongoing threats including:

  • Full whitelist security
  • RDP Controls
  • Endpoint maintenance and performance optimization
  • Anti virus/malware
  • Driver management
  • Patch updates
  • Remote device control
  • Much more.

How can I tell if Endpoint Essentials is protecting me?
Endpoint Essentials uses a realtime protection component called SuperShield. When the product has been installed and is running, you will note a small green shield icon inside the system tray of your computer. Just take a look in the lower right-hand corner of your screen to ensure the icon is there and lit up green. If it is, you are protected.

Are scans automatically run on my devices?

Yes, we setup scanning during your onboarding process. Scans are setup to run twice a week on each device. One scan (daily) will be a quick scan which looks for any viruses that might have entered into the machine. The second scan (weekly) will be a full scan which goes much farther indepth. In addition to the antivirus checks from the daily scan, the full scan checks registry issues, optimizes start up programs, patches many programs, and much more.

What programs does Endpoint Essentials patch?

Endpoint Essentials systematically maintains servers, workstations, and remote computers up to date with the latest and important security patches and software updates. We patch the top 30 most vulnerable programs including Firefox, Chrome, Adobe, Java, Itunes, and many more.

What does the driver management consist of?

We automate the process of your device driver maintenance by leveraging an expansive hardware library. By automating this process, we can extend the productive life of your assets and increase device reliability. Driver management includes monitor, keyboard, mouse, speakers, network card, motherboard and many more.

How much can I expect to pay for Endpoint Essentials?

Endpoint Essentials includes white listing antivirus/ransomware/malware, patch management, driver updating, and device optimization at a very economical cost. Included is a robust online dashboard where you can monitor and maintain your computers 24×7.
To get more pricing: https://threatprotector.com/endpoint-essentials-pricing/

Advanced Email Protector FAQs

What is included in the platform?

Advanced Email Protector is a full platform that includes 256 AES email encryption, compliancy checks, and total email security. Whether it’s checking inbound email for spam/viruses/malware, having a user send an encrypted email, or ensuring that employees remain in compliance with outbound email communications, we have you covered.

How do you handle ensuring that my employees are complying with our data release rules?

Part of our solutions is a policy based compliance system called SafeSend. This feature gives administrators the ability to define which content is not permitted for email distribution. You will be able to use pre-defined content to secure data like credit card numbers, social security numbers, or even create your own custom rules to cover specific policies or legal compliancy needs. If someone tries to send an email that violates company policy or contains malicious content, we will block the email and immediately notify the user that the message was held for review. Administrators can then decide on whether to allow the outbound email by releasing with a simple click of the mouse.

Will this take the place of my normal spam filter?

Yes, CloudFilter stops the junk and lets the good email through. Messages containing offensive, harmful, or policy violating content are held for user review, while good messages continue right on their way. CloudFilter helps keeps users safe and gives you confidence that your email infrastructure is shielded from harm against viruses, malware, ransomware and more.

What type of encryption do you use for outbound emails and how does it work?

In order to send an encrypted email, you simply put square brackets around the subject line and we do the rest. The encryption techniques we employ to secure your email data are state of the art. Bracket is built on a distributed, multi-layer AES256 encryption design with automatic key rotation. This means you never have to wonder if your data is safe.

Does Advanced Email Protector work on any client?

Email encryption is usually constrained to a specific operating system or mail client, but we free you up to send encrypted email from literally any email client. So whether your users prefer iPhone, Android, Windows, Linux, or PC (or maybe they just can’t let go of their Blackberry)… it simply doesn’t matter with Advanced Email Protector.