Businesses today require an increasing level of integration with third-party vendors, clients, and partners. Intertwined ecosystems increase vulnerability, severity of impacts and frequency of a disruption from a cyber attack. To meet this challenge, Cyber Tygr offers the Healthcare Security Program, a combination of security services inspired by best practices and regulatory compliance requirements.

Contact Us


Security Awareness Training

When healthcare executives set reasonable, incremental goals and demonstrate a willingness to try new training methods, creating a culture of cyber awareness may be achieved. Given the volatility and increasing sophistication of the threat landscape, it is imperative.

  • Automated Security Awareness Program - A customized Security Awareness Program tool for your organization will help implement all the steps needed to create a fully mature training program
  • Entertaining and Engaging Content - The world’s largest library of security awareness content includes interactive modules, videos, games, posters and newsletters
  • Leadership and the Human Firewall - Engaging executive sponsorship and support increases the buy-in by staff, creating a front line defense system
  • Changing the Culture - Organizations with strong cybersecurity cultures have tied their training to the overall business mission and patient satisfaction

Phishing Simulation

We imitate a sophisticated phishing attack to test your employees, follow up with training to keep your company’s vulnerabilities from being exploited, then deliver a report that details the organization’s performance showing you who clicked or downloaded on what, and when, and on which device.

  • Baseline Testing - assess the Phish-prone percentage of your users through a simulated phishing attack
  • Train Your Users - The world’s largest library of security awareness content includes interactive modules, videos, games, posters and newsletters
  • Phish Users - Best-in-class, fully automated simulated phishing attacks, hundreds of templates with unlimited usage, and community phishing templates
  • See the Results - Enterprise-strength reporting, showing stats and graphs for both training and phishing, ready for management


Vulnerability Assessment
Quarterly

Our vulnerability assessment uncovers vulnerabilities in the network and recommends the appropriate mitigation or remediation to reduce or remove the risks.

  • Identify possible network security attacks. This type of scan can also detect vulnerable systems on wired or wireless networks.
  • Identify vulnerabilities in servers, workstations or other network hosts. This type of scan usually examines ports and services that may also be visible to network-based scans, but it offers greater visibility into the configuration settings and patch history of scanned systems.
  • Scans of an organization's Wi-Fi networks usually focus on points of attack in the wireless network infrastructure.
  • Test websites in order to detect known software vulnerabilities and erroneous configurations in network or web applications
  • Identify the weak points in a database so as to prevent malicious attacks

The assessment provides detail on patch management, account maintenance, and systems configuration with recommendations on how to mitigate discovered vulnerabilities. Our comprehensive reports include results of the vulnerability scans revealing vulnerabilities like old passwords, old patch levels, unnecessary services, FTP anonymous access, open e-mail relay, etc.

24/7 Security & Threat Monitoring
Ongoing

We monitor your infrastructure 24/7 and alert you to events that could be threats to the organization. Our Security Monitoring Solution includes the following capabilities: Click here to learn more

  • Security Information & Event Management (SIEM) - Cloud Based, SIEM-as-a-service
  • Real-time Log Collection - As devices on your network generate logs and events, they are collected and transmitted to the cloud in real time for automated correlation
  • Accurate Detection - Thousands of security correlation rules enable speedy evaluation of millions of network events to identify suspicious irregularities
  • Human expertise - Every security event identified by the cloud-based, 24/7 cyber-threat detection engine is viewed and evaluated by a trained cybersecurity expert
  • Threat Intelligence - Detailed analysis of valid security alerts
  • Security Response - Threat mitigation and remediation procedures using industry best practices are provided either remotely or on-site to ensure business continuity
  • Status Reporting - Executive-level and in-depth technical reports provide a view of the number and type of threats your network is facing
  • Security Operations Center (SOC) - monitoring, based in U.S.

Security Operations Center & SIEM – User Reports and Dashboards sample


  • Incidents – track mitigating steps: notification, triage and investigation
  • Investigations over Time – examine disposition between open and closed
  • Severity Ratings – maintain visibility of investigations over time
  • Notifications over Time – identify activity trends in the network
  • Triage Response Time - validate incidents are receiving proper response

Get in touch

Phone

757-386-9725

Email

info@cybertygr.com

Address

4545 Commerce St. Suite 2004
Virginia Beach, VA 23462