Cyber Security Services

Middle market companies are at greater risk of a cyber attack.

61% of small and medium sized business experienced a cyber attack in the last year (Ponemon Institute), while 28% of cyber incidents are caused by internal factors from errors in judgement or lack of controls and policies. (Verizon)

%

Small and medium sized business experienced a cyber attack in last year

%

Cyber incidents caused by internal factors

In a recent survey, nearly two-thirds of respondents, primarily management of middle market companies, conveyed a perception of a high or moderate risk of a cyber security incident.

Fewer than half indicated they were prepared for such an incident.

Our approach is designed to address cyber incidents

at any stage of the risk cycle:

Identify
  • Penetration testing – an active process in which ethical hackers attempt to safely breach your system to reveal gaps and digital open doors
  • Vulnerability testing – using sophisticated software, we can test your systems for gaps that allow bad actors to access your systems
  • 24/7 System Monitoring – our tools can keep a constant eye on your network, identify information coming and going, then alert you to any anomalies or risks in real time
  • Privacy Assessments – a technical review of your networks, with recommendations on security improvements to ensure privacy compliance
  • Disaster Recovery Planning – we help you formulate a plan to protect and recover your systems and data in the event of a disaster
Defend
  • Managed Enterprise Security Services – a team of highly trained professionals will continuously evaluate, monitor, and defend your information systems to protect your firm from all kinds of cyber threats
  • Network Design and Maintenance – we can organize your systems to be protected as soon as they go live rather than repairing damage after an attack
  • Cyber Policies and Procedures – since internal mistakes are commonly the cause of breaches, we can create handbooks and policies to protect your networks from internal actions that might compromise your security
  • Training – along with those policies are ongoing training of employees. We can deploy “fake-phishing” campaigns to learn if your employees are following your policies and procedures
  • Cyber Risk Assessment – using the National Institute of Standards and Technology (NIST) model, we can perform a more formal risk assessment to comply with your insurance carriers’ requirements for cyber coverage. Some insurance carriers offer a discount on the insurance coverage, or more favorable coverage, for companies who perform such assessments
  • Privacy Compliance – ensure your systems are secure and properly protecting your customer’s privacy. Our process focuses on maintaining privacy compliance for the standards your company is held to
  • Remediation Compliance – every step of our process to remediate breaches or data loss will be compliant with current standards
Respond
  • 24/7 Security Operations Center – a team of experts dedicated to protecting your systems will monitor and formulate strategies to protect against current and future threats
  • Incident Response – our incident response team can jump into action in the event a breach is discovered, and not only work to recover data and protect your systems, but preserve records in the event of an insurance claim or lawsuit. As part of the planning process, we provide a post-event action plan with roles and responsibilities to minimize disruption and loss of market reputation
  • Forensic Accounting – we provide a seamless integration with forensic accountants who can help find the digital “smoking gun” in the event of a lawsuit or other action occurs. Our entire process is defensible in a court of law

Fast Facts

  • Houston’s largest independent accounting firm, founded in 1973
  • Third largest independent firm in Southwest United States
  • Named Best Places to work by Houston Business Journal, Houston Chronicle and nationally by Accounting Today magazine
  • Our size allows us to offer sophisticated services for complex issues and deliver them with an agility that entrepreneurial client organizations find refreshing
  • Peer reviewer and 100% clean PCAOB opinions demonstrate the utmost quality of our work
  • Highly active in more than 100 professional and civic organizations
  • Members of BKR International, a top 10 international network with the combined strength of more than 160 independent accounting and business advisory firms in over 500 offices and 80 countries

it advisory professional pic

Jeff Eckert
Director at Pathway Forensics,
a subsidiary of Briggs & Veselka
jeckert@pathwayforensics.com
(713) 401-3380

Ask Us a Question