CYBER SECURITY
HACKERS ATTACK
SMALL BUSINESSES
We protect you from them.
We can help you avoid this cyber nightmare.
Protection 1 Cyber Security detects and prevents cyber attacks for
large national companies. We now protect small businesses, too.
Safeguard your customers’ credit card and confidential data from
being hacked by calling us today.
†According to the National Cyber Security Alliance. Read more at http://www.pcworld.com/article/2046300/hackers-put-a-bulls-eye-on-small-business.html
1in 5small businesses get hacked. Nearly 60%of small business
cyber victims closed their doors permanently within six months of the attack.†
Your business is surrounded
by cyber threats.
Ransomware
Malicious software designed
to block access to a computer
system until a “ransom” is paid.
Malware
Intrusive software designed
to disable computers, destroy
data or hijack networks.
Trojans
A type of malware that is
disguised as legitimate
software and is designed to
damage a computer.
Phishing
Criminals pose as a legitimate
company (usually via email)
to gain access to someone’s
financial data.
Destroyed Data
Total loss of data due to a
lack of backup and disaster
recovery equipment.
Privacy Breeches
When unauthorized access,
use or disclosure of personal
information occurs.
We’ll surround it with cyber protection.
We will incorporate four major components into your cyber security system.
ANTI-VIRUS
The inside of your building may
include a security motion detector
that constantly scans to detect any
motion that shouldn’t be there.
That perfectly describes the role of
anti-virus protection. By constantly
scanning your network, it blocks
viruses from the Internet, malware,
infected files or a covert USB drive
placed on your network to steal
your data.
The Bitdefender Anti-Virus
solution we provide stops viruses
from entering and alerts our
monitoring center of any malicious
activity attempts. Bitdefender is
the most highly rated anti-virus
software maker by AV-TEST.
FIREWALL
The perimeter of a business
building has physical security in
the form of locks on doors, bars
on windows, motion lights and
burglar alarms—they keep the
criminals out.
That pretty much describes what
a firewall does for your cyber
network. We prevent hackers from
coming in through a backdoor
“port” on your network to view and
capture the data being transmitted
on it.
The Cisco Meraki Firewall we
provide tells our monitoring
center when a door is open—so
we can close it before your system
gets hacked.
Network Security Endpoint Security Wireless Security Disaster Recovery
GUEST WI-FI
Your customers want to know their
information is secure in your hands
and that they will be protected
when they access your guest
network. Your Meraki security
appliance can offer your customers
that protection. To protect your
business, we keep the guest
network completely separate from
your business network—this is a
requirement for PCI compliance.
We actively detect and shut down
intrusion attempts and rogue
access points.
Guest Wi-Fi can help grow
your business. By offering
“free” Wi-Fi that requires an
email address, you can build
a list for future promotional
mailings—or even require users
to view a pre-recorded video or
promotional page.
CLOUD BACKUP
Think of your business data and
information as a valuable form
of currency. You don’t leave all of
your cash sitting at your business—
you transfer money in and out of
the bank.
Cloud Storage is really nothing
more than a bank for your
business data and information. No
one can ever be 100% sure they
will not experience a break-in
and the same holds true for your
data. The cloud storage we provide,
including automated cloud
backup and disaster recovery,
will let you recover your data
quickly to reduce downtime for
your business—and avoid paying
ransom for it.
Live Telephone Support 24/7
Talk to a professional, not an automated telephone system.
Our live U.S. based operators answer your calls…usually in
three rings or less.
Software doesn’t call
when you’re attacked.
We do.
The Protection 1 Cyber Security Network Operations Center is
located in Delaware and staffed by IT Cisco Meraki certified
team members. We will monitor your network 24/7 to detect
and help prevent cyber attacks. We’ll also manage your network
for optimal performance, keep it up to date and notify you of
any problems.
CYBER SECURITY
Copyright ©2016 Protection One Alarm Monitoring. All rights reserved. †Service approval ratings were taken from 38,920 completed surveys in 2015.
CALL 844.53.CYBER
FREE CYBER SECURITY AUDIT
Protection1.com/cyber
Can your business
afford to be hacked?
•	If your business is responsible for credit card or other
confidential customer data—you are at risk.
•	If it uses any kind of network, Internet connection or
has desktops, laptops, tablets, smartphones, network
routers or servers—you are at risk.
Your business must maintain the same high level of cyber security
as large enterprises. We can help by putting all of the right pieces
together. Protection 1 Cyber Security will secure your entire small
business network, monitor it 24/7 for breaches, and manage
incidents/issues—both remotely and on-site.
Enjoy the simplicity and convenience of one-stop shopping for a
complete cyber security solution.
4.9 out of 5
Customer Satisfaction†
A+ Rating
Accredited Business
#1 Rated Security
2012 Dealer of the Year—
SDM Magazine

Cyber-Leave-Behind-Brochure-Done (1)

  • 1.
    CYBER SECURITY HACKERS ATTACK SMALLBUSINESSES We protect you from them.
  • 2.
    We can helpyou avoid this cyber nightmare. Protection 1 Cyber Security detects and prevents cyber attacks for large national companies. We now protect small businesses, too. Safeguard your customers’ credit card and confidential data from being hacked by calling us today. †According to the National Cyber Security Alliance. Read more at http://www.pcworld.com/article/2046300/hackers-put-a-bulls-eye-on-small-business.html 1in 5small businesses get hacked. Nearly 60%of small business cyber victims closed their doors permanently within six months of the attack.†
  • 3.
    Your business issurrounded by cyber threats. Ransomware Malicious software designed to block access to a computer system until a “ransom” is paid. Malware Intrusive software designed to disable computers, destroy data or hijack networks. Trojans A type of malware that is disguised as legitimate software and is designed to damage a computer. Phishing Criminals pose as a legitimate company (usually via email) to gain access to someone’s financial data. Destroyed Data Total loss of data due to a lack of backup and disaster recovery equipment. Privacy Breeches When unauthorized access, use or disclosure of personal information occurs.
  • 4.
    We’ll surround itwith cyber protection. We will incorporate four major components into your cyber security system. ANTI-VIRUS The inside of your building may include a security motion detector that constantly scans to detect any motion that shouldn’t be there. That perfectly describes the role of anti-virus protection. By constantly scanning your network, it blocks viruses from the Internet, malware, infected files or a covert USB drive placed on your network to steal your data. The Bitdefender Anti-Virus solution we provide stops viruses from entering and alerts our monitoring center of any malicious activity attempts. Bitdefender is the most highly rated anti-virus software maker by AV-TEST. FIREWALL The perimeter of a business building has physical security in the form of locks on doors, bars on windows, motion lights and burglar alarms—they keep the criminals out. That pretty much describes what a firewall does for your cyber network. We prevent hackers from coming in through a backdoor “port” on your network to view and capture the data being transmitted on it. The Cisco Meraki Firewall we provide tells our monitoring center when a door is open—so we can close it before your system gets hacked. Network Security Endpoint Security Wireless Security Disaster Recovery GUEST WI-FI Your customers want to know their information is secure in your hands and that they will be protected when they access your guest network. Your Meraki security appliance can offer your customers that protection. To protect your business, we keep the guest network completely separate from your business network—this is a requirement for PCI compliance. We actively detect and shut down intrusion attempts and rogue access points. Guest Wi-Fi can help grow your business. By offering “free” Wi-Fi that requires an email address, you can build a list for future promotional mailings—or even require users to view a pre-recorded video or promotional page. CLOUD BACKUP Think of your business data and information as a valuable form of currency. You don’t leave all of your cash sitting at your business— you transfer money in and out of the bank. Cloud Storage is really nothing more than a bank for your business data and information. No one can ever be 100% sure they will not experience a break-in and the same holds true for your data. The cloud storage we provide, including automated cloud backup and disaster recovery, will let you recover your data quickly to reduce downtime for your business—and avoid paying ransom for it.
  • 5.
    Live Telephone Support24/7 Talk to a professional, not an automated telephone system. Our live U.S. based operators answer your calls…usually in three rings or less. Software doesn’t call when you’re attacked. We do. The Protection 1 Cyber Security Network Operations Center is located in Delaware and staffed by IT Cisco Meraki certified team members. We will monitor your network 24/7 to detect and help prevent cyber attacks. We’ll also manage your network for optimal performance, keep it up to date and notify you of any problems. CYBER SECURITY
  • 6.
    Copyright ©2016 ProtectionOne Alarm Monitoring. All rights reserved. †Service approval ratings were taken from 38,920 completed surveys in 2015. CALL 844.53.CYBER FREE CYBER SECURITY AUDIT Protection1.com/cyber Can your business afford to be hacked? • If your business is responsible for credit card or other confidential customer data—you are at risk. • If it uses any kind of network, Internet connection or has desktops, laptops, tablets, smartphones, network routers or servers—you are at risk. Your business must maintain the same high level of cyber security as large enterprises. We can help by putting all of the right pieces together. Protection 1 Cyber Security will secure your entire small business network, monitor it 24/7 for breaches, and manage incidents/issues—both remotely and on-site. Enjoy the simplicity and convenience of one-stop shopping for a complete cyber security solution. 4.9 out of 5 Customer Satisfaction† A+ Rating Accredited Business #1 Rated Security 2012 Dealer of the Year— SDM Magazine