Find out if you're truly secure and not underserved. Book your NO OBLIGATION Risk Assessment

At no cost or obligation, we’ll conduct a FREE technology audit of your company’s overall network health to review and validate as many as 10 different data-loss and security loopholes.

We’ll also look for common places where security and backup get overlooked, such as mobile devices, laptops, tablets and home PCs.

This Assessment can be conducted 100% remote with or without your current IT company or department knowing.

How exactly does this Cyber Security Assessment work?

The assessment has 3 parts.

  • The first part consists of 2 brief and easy surveys to complete. The first survey, is for you, the CEO, Office Manager or other executive to complete. Don’t worry, it’s mostly “Yes/No” or multiple-choice answers that won’t take very long to complete (5 minutes MAX). It’s also NON-technical so you should be able to complete it easily.

 

  • The second part is a technical assessment that is done using a well-known network and cyber security assessment software that will scan your network for vulnerabilities, poor configuration, slow performance and other hidden problems that would affect security and performance. We’ll also do a Dark Web scan to reveal if any of your login credentials, e-mail addresses and passwords are being sold via cybercrime rings so you can change those passwords and be hyper vigilant for phishing scams. When done, this scan will give you a Risk Score and Management Plan to reveal where your network is exposed and what needs to be patched, protected or updated to better secure your systems.

    We will need to work with someone on your team to get the diagnostic software set up, which can be done remotely in under 10 minutes. There will be NO disruption to your network, NO slowness, NO tracking and NO changes. Once this diagnostic tool runs, it will close and exit without leaving any trace it was there.

 

  • The third and final step is to meet with you to go over the Report Of Findings. This is NOT e-mailed due to the confidentiality of the information shared. During this meeting we’ll show you what we discovered and deliver all the reports generated. We will also make recommendations and discuss options for how we might help you remedy any problems discovered. You are under NO OBLIGATION to do or buy anything.
WVD Data Protection

Why do you need to scan my network?

Any thorough Cybersecurity Assessment requires a technical scan to identify any vulnerabilities that may exist in your environment, which is why you want this assessment done.

This scan is non-invasive and uses an industry-standard tool. Nothing is installed and nothing is left behind after the scan is complete. The Government provides a standarization guidelines on how to perform Risk Assessments. A NIST Risk assessment

 

NIST Logo

Are you going to be accessing, viewing or copying our files and data?

Absolutely NOT! No information will be taken, copied or viewed by anyone.

This is STRICTLY confidential, and we will provide you a signed confidentiality agreement before doing the assessment to alleviate any concerns you may have.

WVD Data Privacy
optics innovation

How much time will this take to complete?

The survey shouldn’t take more than 5 minutes to complete and setting up the diagnostic software will take under 10 minutes.

Both can be done remote. After the diagnostics are done, we’ll need at least one hour to sit down with you and all the stakeholders to go over what we’ve discovered and the Recommended Action Plan.

What if you find our records in the dark web? Are we already compromised?

You’ve no doubt heard talk of the “dark web” as a hotbed of criminal activity — and it is. Many breaches are not publicly disclosed, but your information is still on the Dark Web, for sale.

Once on the internet, whether on the surface internet (what we know of as the internet) or on the deep/dark web, you cannot erase it. Many evil things happen on the dark web, it’s not just about stolen credentials. Drugs are sold; people are sold; counterfeit money is sold; access to your server is sold. Your stolen PII (Personal Identifiable Information) can be used to create what looks like a “real person” or to steal your actual identity to open credit card accounts, or even get healthcare.

Even if you don’t have dark web monitoring, if there is reason to believe that your personal information has been stolen, you should assume that it can end up for sale on the dark web.

 

Motiva pii dfs
Report time security assessment

How long after you finish the assessment will we get the results?

Once we have completed the survey and scan, we’ll need 2-3 days to evaluate the results and produce the report.

We’ll schedule a meeting to go over our Report Of Findings and deliver a Recommended Action Plan. This is always done via a private one-on-one meeting and never e-mailed. We can do this via a Zoom meeting or in person.

Our report will include recommendations on what you can do to mitigate any problems we’ve uncovered. In most cases, we can assist you with remediation; however, you are not obligated to hire us or buy anything. If you choose, you can take what you find back to your current IT person or company to resolve.

Our Free Cybersecurity Risk Assessment Will Give You The Answers You Want, The Certainty You Need

This Assessment will provide verification from a qualified third party on whether or not your current IT company is doing everything they should to keep your computer network not only up and running, but more importantly, if your business is at serious risk for hacker attacks, data loss and extended downtime. After this Assessment, you’ll get answers to questions such as:

Find out if your business is truly secure and not underserved. Book your NO OBLIGATION Risk Assessment

SEE WHAT OUR CLIENTS HAVE TO SAY!

Robert Stone
Robert StoneManaging Director - Stone Insurance
Read More

“Motiva has been great to work with from the beginning. The tech support team does a fantastic job of communication within the team so that they know what is going on with their customers. They are very knowledgeable and patient, they take the time to understand the issue so they can fix it quickly. They explain what they are doing and why, to your system, which I really like. They follow up to make sure the issues were handled to our satisfaction; I have never had a tech company do that. They are really the nicest people; I cannot say enough of what a pleasure it has been to work with them.”

Anthony DeFede
Anthony DeFedeTCE Insurance Services, Inc.
Read More

“It’s rare that I write about somebody else. I strongly recommend you take advantage of Walter Contreras who is an expert in Cybersecurity and IT Managed Services. Even if you already have an IT company that handles your cybersecurity or a team on board, I cannot stress the importance of having a qualified, independent cyber security specialist conduct a [Cybersecurity] review. If they find areas that need improvement, they will let you know what they are so you can be brilliantly proactive in getting systems in place to ensure you never have to experience an embarrassing, financially devastating and disruptive cyber-event.”

Armond Schwing
Armond SchwingSchwing Insurance Agency, Inc.
Read More

“Motiva has been great as a single source for solving all of our IT issues. They ensure that we are compliant with the requirements for the way Insurance Agencies protect the PPI data entrusted to them, which is extremely important. You should jump on board with them as your new IT Company. I’m confident in saying that Motiva is responsive to your needs, and their team is very capable of handing what your Insurance Agency needs.”

Ellen Zuckerman
Ellen ZuckermanInterstate Home Loan Center, Inc.
Read More

“The biggest single benefit for us is that there's always someone there to take our call and help us fix our issue or answer our question. When COVID19 hit, Motiva was really good during this stressful time since they were set up with the tools to have us work from home from the start. If someone was on the fence about choosing Motiva. "Get off the fence and use Motiva”