Cybersecurity for your business

CIT-logo

If it seems to you that the cybersecurity environment has never been worse, you a right.  Cyber-criminals,  hacktivists, foreign governments, and political extremists has all found the Internet to be a wonderful playground from which to conduct criminal exploits, steal intellectual property, and launch politically motivated attacks of various types.  Not a week goes by without the revelation of yet another cybersecurity breach at a major retailer, online service provider, or major business network.

Think your business is too small to be a target?  You are mistaken.  In fact small businesses are a choice target of cybercriminals due to the presence of valuable intellectual assets and plump bank balances, coupled with the relative lack of serious security compared to major corporate enterprises.  Many small businesses have lost anywhere from a $65,000 payroll to over $2 million in escrow funds to cyber-criminals.

We are pleased to announce some exciting news:  As of October 5, 2015, WyzGuys has become part of Computer Integration Technologies, Inc. (CIT), Inc. a technology solutions organization based in Woodbury, Minnesota.  Joining CIT was a natural next step in furthering my goal to significantly enhance the services and expertise WyzGuys has offered its clients all along. As many of you may know, my deepest expertise and passion is in cybersecurity and this merger will allow me to focus those efforts within CIT’s cybersecurity service offering.

You may continue to work directly with me, receiving the same level of personalized service and attention to detail you’ve enjoyed before, but now backed by the abundant resources of CIT and the considerable expertise of its over 70 employees, and the additional services and solutions they can offer.

At CIT, we provide cybersecurity services such as:

  • Public Speaker on Cybersecurity

  • Cybersecurity Awareness Training for Employees

  • Security Audits

  • Vulnerability Scanning

  • Penetration Testing or “Pen-testing”

  • PCI/DSS Compliance Audits

  • HIPAA/HITECH Compliance Audits

  • Firewalls and Intrusion Detection Systems (IDS)

  • Internet Security Software Products

  • File Encryption

  • Email Encryption