Unique IT Services for Your Business

As a full-service IT consulting firm, the Information Security Agency offers the following services:


Information Security Awareness Training

Information Security awareness is the knowledge and attitude members of an organization possess regarding the protection of the physical and, especially information assets of that organization. Being security aware means you understand that there is the potential for some people to deliberately or accidentally steal, damage, or misuse the data that is stored within a company's computer systems, throughout the organization. Therefore, it would be prudent to support the assets of the institution (information, physical, and personal) by trying to stop that from happening. .  Since information security is everyone's responsibility, the Information Security Agency will come to your office, train your staff, and run tests in Social Engineering to assure that the company's Information Security Policy is being adhered to and is enforceable. Don't be caught off guard when compliance and customer trust issues arise. Get in the know about the dangers that can affect your corporate networks.

ChildWatch - Cyber Safety Seminar

In response to the increasing threats targeting our children online, the ISA has developed the ChildWatch - Cyber Safety Seminar. The first installment in the series is 'Is Your Child Safe Online???'. This series of lectures was originally initiated to combat the epidemic of increasing Sexual Solicitation, Predators, and other child safety cases showing up in the news around the country. We have expanded and tailored our series to meet a more diverse audience as well as discussion of other topics like Cyber Bullying, Sexting, Human Trafficking, and Geo Fencing. We at the ISA are aware that the issue of online safety is not limited to children. Everyone is at risk, and it starts with individual knowledge. Our series now includes Older Audiences, Parents & Teachers, Young Professionals, College Students, and more. Let us know if one of these lectures can benefit your audience, staff, or congregation.

Digital Forensics & Information Gathering

Digital forensics investigations have a variety of applications. Digital Forensics is commonly used to provide evidence to support or refute a claim before an employer or court. The science is used during internal corporate investigations, audits, efficiency assessments, or intrusion investigation. Digital forensics is also useful in identifying what is going on in a minor’s computer or electronic device. As well as identifying direct evidence of a crime or breach in company policy, digital forensics can be used to attribute evidence to specific suspects, confirm alibis or statements, determine intent, identify sources (for example, in copyright cases), weed out bad employees, or authenticate documents. The ISA can provide you with Digital Forensics services so that you can know for sure what is going on in your business or home.

Network/Web Page Security Assessment

The goal of a security assessment (also known as a security audit or security review), is to ensure that necessary security controls are integrated into your business.  A properly completed security assessment should provide documentation outlining any security gaps (differences) between the company's processes, and approved corporate security policies.  Management should be involved with information security from the top down.  This will assure your customers, stockholders, and employees that you have taken the neccessary steps to comply with best practices regarding information security. In some cases, best practices could mean meeting government compliance requirements.


Penetration Testing

In the world of computer security, penetration testing is one of the most important concepts. While a security assessment can find points of vulnerability (including human) within the computer system or network, a penetration test goes a step farther. Basically, the Penetration Tester is authorized to hack into the system not only to identify vulnerabilities, but to exploit those vulnerabilitites to see the extent of damage and/or loss that can be experienced or created by a malicious hacker gaining access. A 'pen' tester then reports to the IT department and upper management the level of severity that each vulnerability represents, as well as remediation methods. In some cases, penetration testing is used as an instrument to assess the current security posture or the security team's awareness of, and responses to attacks.



Additional Services

  • Provide Information Security Awareness seminars for employee or staff
  • Instruct the proper techniques for ‘Hack-Proofing Your Identity’
  • Design and review Corporate Information Security Policy
  • Wired Network, Wireless, and Application Security Assessment
  • Wired Network & Wireless Penetration Testing
  • Provide course instruction covering Introduction to Computers to advanced certifications
  • Government Security Compliance: GLB, HIPAA, SOX, FISMA, PCI
  • Bypass passwords of locked systems
  • Consult on information security issues
  • More