Proactive Protection for Modern Organizations

Testimonials

"We were approached with the opportunity for a cyber security training and a network scan.  As we finished the process Sentient Cyber Security gave us a detailed report and training fully explaining where the threats in my business were, the consequences associated with those threats, and how to fix them.  It was enlightening to have these tools and information displayed in a way I, as a business owner, could fully understand and act upon.  Even as a small firm my business needs to be protected from online threats, Sentient Cyber Security provided me with that peace of mind."

 

-Owner, Denver based Industrial Manufacturer’s Representative

State of Cyber Security in Small & Medium Sized Businesses

State of Cyber Security in Small & Medium Sized Businesses

 

Key Findings

Companies are aware of the threat but believe they are too small to be a target.

Attacks are Proliferating

58% of all Cyber breaches and incidents targeted Small Business

More Data is at Risk

54% of attacks involved data breaches, with an average of 9,350 records stolen

Attacks Are More Sophisticated

81% of malware attacks avoided anti-virus solutions

Email and Personnel are the Biggest Threat

92% of all malware is a result of interacting with a phishing/malicious  email

The Rise of Ransomware

Ransomware is defined as a sophisticated piece of malware that blocks the victim’s access to company files.

Ransomware is defined as a sophisticated piece of malware that blocks the victim’s access to company files.

Increase in Frequency

39% of all malware incidents were ransomware infections

Laptops/Desktops are the Culprit

78% of ransomware attacks were initiated through a compromised desktop or laptop

Laptops/Desktops are the Culprit

78% of ransomware attacks were initiated through a compromised desktop or laptop

Goodbye Bitcoin

60% of companies paid the ransom to regain access to data

Goodbye Bitcoin

60% of companies paid the ransom to regain access to data

Pay to Play

The average ransom to unlock or decrypt data was $2,157

Pay to Play

The average ransom to unlock or decrypt data was $2,157

Cloud Infrastructure & Bring Your Own Device Culture Increase Attack Surface

Cloud Dominance 
85% of enterprises utilize a hybrid cloud environment. 

The Porous Cloud 
27% of third party applications pose a "high" security risk, 58% pose medium security risk.

The "Secure" Cloud
8.1% of cloud apps meet "strict" data security and privacy requirements for enterprise grade security controls.

The Human Element Continues to be the Organizational Weak Link

Here Phishy Phishy

93% of all breaches involved phishing emails during various a

Here Phishy Phishy

93% of all breaches involved phishing emails during various a

Spam is Taking Over
65% of total email traffic is spam.

Propagation of Adware
75% of organizations are found to be infected with some form of adware. 

Training Drastically Improves Employee Click Rates, Still Leaves Room For Improvement
78% of trained employees never clicked on a malicious link, however only 17
% of attempts were reported

*Data from the 2017 State of Cybersecurity in Small & Medium-Sized Businesses (SMB) - Ponemon Institute & the 2018 Verizon Data Breach Investigation Report

 

Security In Depth Starts

With Visibility

With the proliferation of easy to use exploitation tools and leaks of new vulnerabilities, data breaches and cyber attacks are no longer a concern reserved for large enterprises.  Vulnerability Assessment & Management provides asset knowledge & protection.

There is a direct correlation between knowledge of security vulnerabilities and strengthening your business with effective procedures for overall risk and compliance with government regulation.

Vulnerability management is an essential component of any information security program and the process of vulnerability assessment is vital to effective security management. Vulnerability assessment provides visibility into the vulnerability of assets deployed in the network.

Vulnerability Assessments are completed using a combination of manual and automated tools and techniques, which will allow Sentient Cyber Security to analyze the target infrastructure or web applications in order to determine the existence of any vulnerabilities. Networks, including virtual environments, are reviewed with over 50,000 known vulnerability checks and assessments.

Sentient Cyber Security will deliver reports detailing the vulnerabilities identified during the assessment, their potential business impact and most importantly, recommends processes for remediation

 

Move with the shifting threat landscape

Detect and respond to real threats by actively testing the network while complying with government regulation with comprehensive Penetration Testing

Don't leave security up to chance.  Malicious actors exploit networks for personal and financial gain.  Sentient will utilize the same tactics to find holes in network security before a malicious hacker has the chance. 

Expose threats by actively testing and monitoring the network, hosts, and cloud infrastructure 

Identify vulnerable employee practices by utilizing social engineering tactics such as flash drive drops and phone calls. 

Using military trained tactics, Sentient Cyber Security has a 99% success rate 

 

Train employees.  Recuce risk

Actively train employees to mitigate the biggest risk facing businesses. 

The Human Element. 

Spear Phishing targets specific people, researching jobs, organizations, and connections to send specific emails closely replicating the targets actual email usage.  This is the source of over 90% of malware infections

Active spear phishing replication trains employees to spot malicious emails, lessening the risk and employee accidentally install malicious software

All links clicked in training emails direct user to a Sentient Cyber Security landing page educating the user on how the malicious link could have been identified before the click

Implement a "Quarantine" button across all user email platforms to quickly remove identified threats, allowing Sentient to perform analysis on malicious emails

 

What's Your Cause?

Give back to your community

Sentient Cyber Security believes in giving back.  Dogs, recycling, zebras, music, energy, children, clean water, cancer, you name it.  Pick a cause and a portion of your proceeds will go straight to what you care about. 

Secure Your Network and Piece of Mind

Lists your organization as a donor, placing your logo on all donor material for chosen organization ​

Tax Write off

 

Sentient Cyber Security is a Colorado based Service Disabled Veteran Owned Information Security Firm specializing in managed security, vulnerability assessments, penetration testing, policy development, and regulatory compliance.

The Sentient Team

Roy Vreeland brings the technical expertise to Sentient, with the desire to bring enterprise-level cyber security to the masses. Roy has spent nearly a decade bolstering cyber security programs as a boundary technician and penetration test for the USAF and a Red Team Penetration Tester with the NSA.  He has developed threat emulation training for the DoD and audited security for numerous Fortune 500 companies. His technical background and leadership experience makes him an excellent fit for bringing positive changes to the Information Security Industry. 

Roy Vreeland - Chief Technology Officer

Evan Vall - President - Security Solutions

Evan Vall guides Sentient's sales and account management practices.  Prior to founding Sentient, Evan achieved a bachelor's degree in finance & entrepreneurship with summa cum laude honors at Fort Lewis College & is a Certified Ethical Hacker.  He then relocated to Denver to work as an ABB sales representative, supplying critical infrastructure to many industries, including renewable energy and water management. In his spare time, Evan volunteers with WorldDenver, a Denver non-profit that works hand in hand with the Unites States of America State Department.  

  • Grey Facebook Icon
  • Grey Twitter Icon
  • Grey Instagram Icon

© 2021 by Sentient Cyber, LLC

BBB.png
  • Grey Facebook Icon
  • Grey Twitter Icon

© 2021 by Sentient Cyber, LLC