Cyber Internal Threat Detection

Are you concerned about your network’s internal vulnerability? Well we can help! At IT Medical Group we provide the Cyber Internal Threat Detection system for your network. We have different offers for you based on your needs and issues. Alerts are generated automatically every day and forwarded to your IT staff, and our team can…

Are you concerned about your network’s internal vulnerability? Well we can help! At IT Medical Group we provide the Cyber Internal Threat Detection system for your network. We have different offers for you based on your needs and issues. Alerts are generated automatically every day and forwarded to your IT staff, and our team can also assist in addressing any impending problems. All of our customers receive our basic internal threat detection package for free, with the option to pay a little each month for our platinum services. 

Basic Cyber Internal Threat Detection package 

Below are the security services we offer through the basic plan, free! Please inform us if you’d like to utilize these services. 

  • Network computers install critical patches within 30 days 
  • Network security ensures that only authorized wireless networks are being connected to
  • Restricted access to accounting computers, business owner computers, and IT Admin only computers to authorized users only 
  • Connection only to authorized printers 
  • Control additions of new users to the domain and new local computer administrators
  • IT administration access is restricted to minimum use 
  • Restrict unauthorized users from logging in to multiple computer systems 
  • Adding authorized new devices to restricted networks
  • Ensuring users can only access authorized systems

Platinum Cyber Internal Threat Detection package 

All services above are included in the Platinum Cyber Internal Threat Detection Package, as well as the services listed below. There is a monthly fee for utilizing our Platinum services. 

  • Restrict access to computers with ePHI and cardholder data environment (CDE) to authorized users only 
  • Examine suspicious logins
  • DMZ computers have critical patches installed within 30 days 
  • Control any changes on locked down computers 
  • Any computers that are not authorized to access the internet directly have restricted internet access
  • Find any network changes to internal networks and internal wireless networks 
  • Repair medium severity internal vulnerabilities, and high severity internal vulnerabilities immediately