
Real Talk – Why is Cyber Security behind?
As a Cyber Security Services company, we often wonder...
Cyber Security As A Service
INSIDE|OUT is your complete Cyber Security as a Service solution to Monitor, Alert, and Control a breach. We provide deep level scans and reporting that meet numerous compliance standards as well as the peace of mind knowing if there is a breach you will be alerted and the device will be controlled.
Compliance
We collect and analyze your data to produce the required documentation to meet compliance regulations. We don’t simply hand you templates and ask you to do the work. A true assessment requires complete technology infrastructure documentation and a security analysis as the basis for all other steps.
Overwatch Platform
ICS Cyber Management is proud to introduce a low cost small to medium business Cyber Security Platform called Overwatch Platform. This is monitored daily and provides internal threat detection within the businesses network behind your firewall. Overwatch pricing starts at just $100.00 a month.
vCISO
The vCISO works with all business and functional lines to ensure a comprehensive and strategic approach in mitigating operational risks. They will assess the current state and will develop a security program based on a gap analysis.
Cyber Shield
With Cyber Shield from ICS Cyber Management you have a first line of defense if you mistakenly connect to an unknown malicious site. Cyber Shield provides protection from millions of known malicious sites by blocking the request as it leaves your network.
Network Monitoring
Provides a monitoring system as well as the 365 X 24 X 7 Network Operations Center (NOC) services capable of monitoring the network and associated devices on a global stage, alerting by email, text and phone the customer assigned network managers for critical issues.
In July of 2015 we created ICS Cyber Management to develop an easy and affordable program to address the entire range of compliance concerns. We started with a simple question: What does it take to provide a complete and acceptable assessment and to achieve and maintain audit readiness?
A true assessment requires complete technology infrastructure design documentation and a security analysis as the basis for all other steps to reach an audit ready status. A qualified third party technical analyst should evaluate the data gathered as well as the policy and procedure documentation to assess whether these policies and procedures are in use as the standard operating procedures. Finally an archive is needed storing, full electronic documentation of the technical data, required policies and procedures, training certifications, breach plan, and ongoing measures to ensure privacy are required.
The ICS Cyber process provides a complete assessment and a complete set of documentation that establishes audit readiness for the client. We provide continuous documentation management to assure that the client remains Audit Ready All The Time!
With the introduction of our Breach Monitoring system INSIDE|OUT, we now offer a unified security and alerting solution! This software continually monitors your network and when triggered alerts you isolate and contain the threat. Combined with our Network Enforcer module, we now offer the ability to automatically contain the zero day machine!
Introducing
LATEST COMPANY NEWS
Real Talk – Why is Cyber Security behind?
As a Cyber Security Services company, we often wonder...
With so much happening in the world right now,...
More Social Scamming continues to increase and cause more...
Today is World Password Day which was created to...
As all of us find ways to settle in...
SMS and Text messages are still used by businesses...
ICS Cyber Management In the News
Working from home? Have questions on how to stay...
Your Corporate Webinar Just Went From Boring to Possibly Dangerous
A recently reported flaw in Corporate America’s ubiquitous platform...
Extortion/Sextortion Scams Continue
For the past several months there have been scam...
Alabama Passes Data Breach Notification Act
Alabama Data Breach Notification Law [gview file=”https://www.icsmedtech.com/wp-content/uploads/2018/04/Alabama-Data-Breach-Notification-Law-1.pdf”]
Download Inside|Out 2018
Alabama MGMA Summer Conference
ICS Medtech was proud to participate in the...
Amex Announces 3rd Party Security Breach
The PCI-DSS security controls might need version 4.0 I...
ICS Medtech was honored to sponsor Casino Night at...
Birmingham MGMA Conference Booth Ready, Willing, and Able
If you are near the Hyatt Regency Birmingham –...
ICS Medtech is in the Birmingham Medical News
Big thanks to Jason Irving and his amazing team...
Hospital Pays $17,000 to Ransomware Attackers
Hope this hospital has their HIPAA i’s dotted and...
ICS...
Healthcare security from the Shark Tank
[av_textblock size=” font_color=” color=”] Listen to a Shark talk...
Does the constant threat of being hacked have you...
“HIPAA compliance: another year older, but hopefully not deeper in debt” Review
Deborah Hiser’s article “HIPAA compliance: another year older, but...
HIPPA by the numbers Please contact us @...
Are you Positive you are HIPAA compliant?
ICS Medtech can assist you in answering YES...
Million Dollar HIPAA Settlements Are About Compliance, Not Harm to Individuals
The National Law Review published an article that puts...
Mobile Technology Storage Causing HIPAA Violations
As people, our daily lives revolve around technology so...
College football rules the country from September to January,...
Hounded Out of Business by Regulators
Title from an article in the Wall Street Journal...
WHY CHOOSE US
Imagine a compliance program that uses everyday language and automation to simplify the process for every HIPAA Officer and practice manager. Our HIPAA program takes the stress off the practice manager by giving you a full time resource to manage all of your compliance needs.
Inside|Out is an all-in-one appliance that monitors and alerts on any event or threat as they occur withinyour network and take action to isolate the device or threat before the damage is spread throughout your network. It is designed for any size business to provide an affordable Breach Management Solution.
Sign up to take all of your required training online today! It is fast, easy, and classes can be taken on any device.