Some cyber security solutions are too hard. Some cyber security solutions are too soft. Here at Petronella Technology Group (PTG), with our patented Zero-Hack Cyber Safety Stack, we can guarantee that with the perfect blend of defense and affordability your small business’s Cyber Security will be just right!

Zero-Hack Cyber Safety Stack

PTG offers your business our patented, Zero-Hack Cyber Safety Stack, representing the progressive application of up to 39 proactive and reactive technologies and protocols

In reality, few organizations actually need all 39 layers to adequately protect the data of their company and clients, which is why PTG offers customizable cyber security controls for each client, achieving a blend of a solid defense and affordability.  We provide a comprehensive digital prophylaxis against unauthorized access to your organization’s InfoTech and user accounts.

PTG's Zero-Hack Cyber Safety Stack is the perfect mix of reactive cyber security protection with the proactive work of a fractional Chief Security Officer and 24x7 helpdesk to give your company the peace-of-mind needed in today's increasingly hostile cyber criminal environment.

PTG Cyber Safety

The term "cyber security" describes a set of technologies and services for the reactive defense, often developed from previous attacks and malware—and profiled in a threat landscape and database.

As opposed to the reactive "cyber security," PTG your business with"cyber safety".  PTG's Cyber Safety is a proactive offensive solution against new, ingenious, historically-unknown attacks. PTG's Cyber Safety includes:

  • Data prophylaxis at the most fundamental layer (kernel-level) of data storage
  • Content Filtering by which to restrict user access to popular social networks
  • Geo-blocking of users from specific countries (such as Russia and North Korea)

Four Pillars of Cyber Safety

PTG is able to incorporate our patented Zero-Hack Cyber Safety Stack with our tried and true Four Pillars Assessment, which assesses your business through 4 different lenses, 

 

  • 100% Uptime: We make sure your company's information processing and communications infrastructure  are always running.
  • Business Apps: Advisories about or direct management of desktop and mobile:
    • Business Application Software (such as QuickBooks)
    • Productivity Software (i.e., Office 365)
    • Website Management Systems
    • Telephony (AT&T or Skype)
  • Shared Services: Advisories about and direct management of public cloud services such as:
    • Microsoft OneDrive or Dropbox
    • Virtual Private Networks (VPNs)
    • Redundant internet service providers (ISPs).
  • Security: Advisories about and direct management all things cyber security:
    • Policies
    • Procedures
    • User training and certifications
    • Physical and digital IT infrastructure

In addition to infusing your network infrastructure with PTG's Four Pillars Assessment, we tailor our patented 39-layer Zero-Hack Cyber Safety Stack to meet cyber safety goals. Unlike other cyber security services, PTG can provide to its clients a fractional or virtual Chief Information Officer or Chief Security Officer.

Fractional Roles

Most small businesses rely on a skilled system administrator or technician for most of their IT support needs.  But most IT techs are unable to provide the 360 degree cyber protection provided by the experienced and certified PTG team.

Chief Information Officers    

Chief Information Officers (CIOs) address a more comprehensive set of needs required by your small business and its users and trade partners. CIOs ensure that the IT resources align with the mission, vision, strategies, and values of the organization.

Chief Security Officers

Chief Security Officers (CSOs) address requirements for higher levels of confidentiality of:

  • Customers and protected information
  • Physical security of buildings
  • Computers and data storage
  • The training and certification of users and technical administrators.

For those firms that require compliance with HIPAA guides, the CSO role can include the continuous management of information security policies, procedures, and technical systems in order to maintain the confidentiality, integrity, and availability of all organizational information systems. 

Layered Security

PTG Cyber Safety security is layered, meaning our Zero-Hack Cyber Safety Stack will help prevent any damage to your company's hardware, software or electronic data.  It also protects your networks from digital service disruption in the service you provide, by quickly recovering and/or restoring any corrupted data from secure backups.

Effective layered security doesn't just stop at at digital protection.  For a robust and well-rounded cyber safety portfolio, physical access must also be controlled.  System hardware and network access must also be protected from  malicious data and code injection. And let's not forget the risk operators can pose!  Whether intentional or accidental, IT security personnel are susceptible to being tricked into deviating from secure procedures through various methods of social engineering.  After all, phishing emails don't execute themselves.

The term "layered security" represents the blending of more than 40 technologies and services in a way that is unique to your business requirements. 

"Layered Security," in fact, bears some similarity to "defense in depth" (DiD), which is actually adopted from a military strategy.  This particular strategy involves using multiple layers of defense simultaneously to resist the rapid penetration of a strong attacker, and relies on the fact that the attack will eventually exhaust itself, making it easier to overcome. 

The IT use of DiD requires more than merely deploying technical security tools; it also requires:

  • Policy and operations planning
  • User training
  • Physical access security measures
  • Direct IT personnel involvement in dealing with attempts to gain unauthorized access to information resources

PTG integrates DiD tactics in our PTG Zero-hack Cyber Safety Stack.

The PTG Zero-Hack Cyber Safety Stack layers 39 unique, non-redundant, defensive-reactive and offensive-proactive tactics in its patented digital prophylaxis.

We offer three customizable cyber security options to fit your needs and budget:

  • Basic Cyber Safety provides the minimum level of protection.
  • Advanced Cyber Safety provides for full compliance with HIPAA and GDPR regulation
  • Unhackable Cyber Safety provides complete solution that, despite global white-hat hacking contests, have not ever been defeated. 

PTG Basic Cyber Safety

PTG's Basic Cyber Safety package addresses the technical and human aspects for preventing unwanted intrusions and theft. Below you will find summaries of the key features of Basic Cyber Safety:

Pillar One: Uptime

Your information processing and communications infrastructure is always on with PTG's Zero-Hack Maintenance, which offers remote monitoring and management.

  • Description: Proactive monitoring of threat landscape and direct surveillance of malicious penetration attempts, weekly updates of end-user and server security software
  • Role: IT Specialist Level II

Pillar Two: Business Apps

We offer advisory and/or direct management of desktop and mobile business application software with PTG's Zero-hack MS Office 365 Patented digital prophylaxis.

  • Description: Maximum security configuration with:
    • Notifications for any unusual behavior (changes to mailboxes, forwarding, rules, logins, etc.)  
    • Implemention and monitoring of the two-factor user authentication
  • Role: Chief Security Officer

Pillar Three: Shared Services

PTG's Zero-hack Virtual Private Network is a patented digital prophylaxis for remote access from any public network that will allow us to advise and directly management your public cloud services, VPNs, ISPs, etc...

  • Description: We ensure your Public WiFi is secure with:
    • Tunneling: Users may use any WiFi network with assured privacy
    • Encrypted Access: Defeats WiFi network sniffing and capture of user credentials
  • Role: Chief Security Officer

Pillar Four: Security

PTG will advise and directly manage all cyber security policies, procedures, user training and certifications, and physical and digital IT infrastructure.  We are able to do this for your business using PTG's Zero-Hack User Certification which isCyber Security hygiene for you and your employees

  • Description: Online training and certification of users in the basics of:
    • Confidentiality
    • Malicious intents
    • Anti-phishing
    • Password best practices
    • Encryption of laptops
    • Use of public WiFi
  • Role: Chief Security Officer

Please keep in mind that while this level is perfectly sufficient for many businesses, PTG's Basic Cyber Safety package represents a minimum security measure. It does not satisfy the more rigorous requirements for compliance with HIPAA, NIST, DFARS or GDPR, which is why we also offer PTG's Advanced Cyber Safety package and PTG's Unhackable Cyber Safety package.

PTG Advanced Cyber Safety

With PTG's Advanced Cyber Safety package you get all the security controls of the Basic Cyber Safety program, with additional services and technologies that will help you achieve compliance with HIPAA, DFARS, NIST, GDPR, etc...

Pillar One: Uptime

In addition to PTG's Zero-Hack Maintenance, you will also receive:

 

  • PTG's Office 365 Email
    • Description: 100% Uptime, which is a patented digital prophylaxis that guarantees that your users will have send/receive email capabilities and addresses downtime of Office 365, as well as: 
      • Email Shadowing 90 days of instant email recovery of any inbound or outbound message…not provided Microsoft support 
      • Email Continuity Office 365 has and will go offline, with PTG Continuity you will be able to receive and respond to mission critical email even if 365 becomes unavailable
      • Email Queuing PTG will immediately queue all email 30 Days the mail host becomes unavailable
      • Email Protection 17 layers of Anti-virus, phishing and spam blocking power utilizing the lowest false positive system ever invented
      • Outbound Smart Host with admin and user notifications and easy release system, along with a Dedicated IP address assigned to your account. Microsoft puts you in a shared pool creating a high probability of getting blacklisted as a result of another 365 clients with bad sending practices.
      • Admin notification of quarantined emails
      • Live expert help desk
      • Redundancy
    • Role: Chief Security Officer
  • PTG Help Desk which gives you phone and secure remote mirroring of end-user computers and mobile devices
    • Description: Certified IT support specialist, available 9am to 5pm Eastern in a 10-hour blocks for a 12-month contract; (extended service hours and onsite service available in the Unhackable Cyber Safety programs)
    • ​​​​​​​Role: IT Specialist Level II

Pillar Two: Business Apps

We offer advisory and/or direct management of desktop and mobile business application software with PTG's Zero-hack MS Office 365 Patented digital prophylaxis.

  • Description: Maximum security configuration with:
    • Notifications for any unusual behavior (changes to mailboxes, forwarding, rules, logins, etc.)  
    • Implemention and monitoring of the two-factor user authentication
  • Role: Chief Security Officer

Pillar Three: Shared Services

PTG's Zero-hack Virtual Private Network is a patented digital prophylaxis for remote access from any public network that will allow us to advise and directly management your public cloud services, VPNs, ISPs, etc...

  • Description: We ensure your Public WiFi is secure with:
    • Tunneling: Users may use any WiFi network with assured privacy
    • Encrypted Access: Defeats WiFi network sniffing and capture of user credentials
  • Role: Chief Security Officer

Pillar Four: Security

PTG will advise and directly manage all cyber security policies, procedures, user training and certifications, and physical and digital IT infrastructure.  We are able to do this for your business using PTG's Zero-Hack User Certification which isCyber Security hygiene for you and your employees

  • Description: Online training and certification of users in the basics of:
    • Confidentiality
    • Malicious intents
    • Anti-phishing
    • Password best practices
    • Encryption of laptops
    • Use of public WiFi
  • Role: Chief Security Officer