info@computercentral.co 635 Bultman Dr., Sumter SC 29150 + 1 (803) 570 8440

Security Training

The best defense is an informed work force. Most breaches occur after a user gives away their credentials to a hacker.

Email Encryption

Use our encrypted email service to send sensitive email content and be HIPAA, Legal and HR compliant.

Cloud Backup

Our cloud backup solution provides you a way to quickly recover in case of data lose or a natural disaster.
// Approach

Our Approach To Security

Secure By Design
We maintain managed routers on your network to prevent intrusions to your LAN.
Antivirus / Malware
We offer a cloud managed antivirus solution that allows us to keep a tight reign on your file systems.
Continuous Monitoring
We perform regular Vulnerability Assessment Scans on your network.
Solutions

High-Performance Solutions

For most new business customers we encounter it's not a matter of "if" the will get hacked, but "when" will they get hacked. Fortunately we have the solutions to secure your IT infrastructure.

Cyber Security

Computer Central uses a VAS server to check your network for remote vulnerabilities and threats. Hack attempts are on the rise with hackers finding new vulnerabilities and exploits every day. We keep our VAS server up to date and run scans on all service contract networks monthly. In addition to detecting security vulnerabilities and threats our VAS scans also check for PCI Compliance as well as HIPAA Remote Access Compliance.

Disaster Planning

A great backup is the ultimate defense if you are the victim of a data breach/loss. Our cloud backup solution keeps your data off-site and encrypted where hackers can't access it. Worse case scenario - we recover from the cloud backup.

Secure Managed IT

We keep your public facing network appliances updated with the latest firmware and security patches. We offer the complete line of Ubiquiti UniFi® cloud managed network hardware.

Secure Awareness Training

No matter what hardware and software solutions your business has in place to protect from hacks, the most likely breach will occur from a user unknowingly exposing their login credentials.We can guide you in creating a security policy tailored to your company. Educating your staff is your best defense to prevent a security breach.

Compliance

Computer Central can help you maintain PCI Compliance with your credit card processor or bank. We can also help implement HIPAA compliance guidelines that your business may be required to meet.

Secure By Design

No one thing will protect your business from a determined hacker. Your IT infrastructure has to be protected from the top down with nothing taken for granted. Managed Routers, Virtual Private Networks, Multi-Factor Logins, Managed Antivirus, SSL Certificates, Encrypted Email and Cloud Backups should all be part of your company security policy and best practices.

Innovative Electronic

Protection Of Your Office

MFA (Multi-Factor Authentication) adds a second level of login in addition to your password.  Typically you will get a text on your cell phone with a validation code or you can use an Authenticator App to approve the login.

We highly recommend enabling MFA on all email accounts.  With MFA enabled a hacker can't log into the account even if they have the password.

We never recommend opening ports on a firewall to provide remote users access to network resources such as a shared folder on a server.  Instead we will setup either a site-to-site VPN between your offices or a Client VPN on an employees remote computer.

A VPN provides your remote working staff members to securely access your office network without exposing your data.

There are many variations of passages of Lorem Ipsum available, but the majority have they an suffered alteration in some form, by injected answ humour, or randomised words which don’t looke even slightly believable.

There are many variations of passages of Lorem Ipsum available, but the majority have they an suffered alteration in some form.

There are many variations of passages of Lorem Ipsum available, but the majority have they an suffered alteration in some form, by injected answ humour, or randomised words which don’t looke even slightly believable.

There are many variations of passages of Lorem Ipsum available, but the majority have they an suffered alteration in some form.

Security

Complete Website Security

We can host your website and will install a website firewall, brute force plugin, SSL certificate and malware plugin to protect your site.

Malware Detection Removal

Content Delivery Network

24/7 Cyber Security Support

Managed Web Application

How To Protect Your Company

Cyber Security Checklist

Multi-Factor Authentication
Virtual Private Networks
Managed Firewalls
Website SSL Encryption
Malware Removal
Vulnerability Assessment Scans
Managed Business Antivirus
Security Training
Frequent Security Scans
Cloud Backups
Make Appointment

call or email us for an appointment

Let us show you what we have to offer. If you aren't already here because of a referral from one of our existing business clients, we can provide you as many referrals as you want for just about any type of business.

635 Bultman Dr, Sumter SC
OFFICE ADDRESS
info@computercentral.co
OUR MAIL
+1 (803) 570-8440
PHONE NUMBER