Only one weak link can make the whole chain vulnerable.

Advanced Phishing & Spam Protection
Did you know that 66% of malware is via email attachments? *
Our offering is a simple approach to email management and security. We provide a comprehensive email protection and continuity product that helps defend against the latest threats, from spear-phishing, ransomware, impersonation and other targeted attacks.
Impersonation Protection:
Our solution provides real-time protection against social engineering attacks like whaling, CEO fraud, or W-2 fraud.
URL Protection:
A layered security check is performed on the destination site when users click on a link from an email. In addition, following the initial URL link check, the solution then determines if the link downloads to a file directly and scans for potentially malicious content in the file.
Attachment Protection:
Replaces attachments that potentially contain malicious code with a clean, transcribed version. Employees have access to the original file that undergoes a detailed security analysis.
* Verizon 2017 Data Breach Investigations Report 10th edition
Web Protection (DNS)
Did you know that email and web are collectively used to deploy 99% of malware-based cyberattacks? *
Adding our Web Protection service provides an additional layer of protection between an employee and the internet by blacklisting dangerous sites & filtering out unwanted content, in the office or at home. The domain name system (DNS) works like a phone book for the internet. When your employee enters a website, the DNS servers take that input and translate it into the unique internet protocol (IP) address that lets the browser open the desired site. DNS protocols are highly vulnerable to cyberattacks. By redirecting users’ web traffic through a cloud-based, DNS security solution, businesses can finely tune and enforce web access policies, ensure regulatory compliance, and stop threats at the network’s edge.
* Cisco Annual Cybersecurity Report for 2018
Security Awareness Training
Did you know that 77% of security professionals rank Awareness Training as the most effective tactic to prevent or block ransomware? *
More than ever, employees are the weak link in an organization’s network security. They are frequently exposed to sophisticated phishing and ransomware attacks. Employees need to be trained and remain on their toes with security top of mind.
Find out how we can help you manage the continuing problem of social engineering and create a human firewall.
Simulated Phishing Campaigns:
StratusPointIT will create a phishing simulation to test your employee’s awareness to potentially harmful emails, from who opened, clicked, and entered credentials. We will notify the employee that the email was a test and show them the key indicators within the email to watch out for, from incorrect/mis-spelled domain names to hovering over links within the email. In addition, we will provide management with a report of the results.
Training Videos and Newsletters:
StratusPointIT will provide access to training videos and newsletters focused on numerous areas for your respective business. From CEO Fraud, Credit Card Security, GDPR, Mobile Device Security, Ransomware, Strong Passwords, PCI compliance, Safe Web Browsing, and much more.
* Cybersecurity Insiders & Bitdefender 2017 Ransomware Report

Microsoft 365 / Google Workspace Back-up and Recovery
Did you know that 74% of security professionals rank Data Back-up & Recovery is the most effective solution to respond to a successful attack? *
Having your Microsoft 365 and/or Google Workspace backed-up provides a multi-layered approach to security against ransomware, compliance needs such as HIPAA, & advanced recovery features. It’s a common misconception among SaaS/Cloud users that doing back-ups isn’t necessary for their data because it exists in the cloud. From human error to phishing emails or malware can cause data loss. SaaS/Cloud providers protect your data from hardware failure, software failure, natural disaster, and power outages. While StratusPointIT can help protect your data from human error and malicious acts from internal or external sources.
Key Features:
- For Microsoft 365 protect your OneDrive, Contacts, Calendar, Mail, and SharePoint Online data that goes beyond Microsoft 365’s native recovery capabilities and retention period.
- For Google Workspace protect your Mail, Contacts, Calendar, and Drives (including Team).
- Automated backups once a day that capture point-in-time snapshots of each users’ relevant app data, with the option to perform additional backups at any time.
- Unlimited storage space.
- Detailed activity log with all administrator and user action records.
- Your data is secure, easily recoverable, and protected. SOC 2 Type II audited, supports HIPAA and GDPR compliance needs, data encryption both at rest and in transit.
* Cybersecurity Insiders & Bitdefender 2017 Ransomware Report
Multi-Factor Authentication
Did you know that 81% of breaches leverage stolen and/or weak passwords? *
Establishing multi-factor authentication (MFA) by sending a second randomly generated pass code to your phone will secure and protect your critical data, from sensitive applications to Microsoft 365, Google Workspace, User Workstations as well as VPN and RDP connections.
Key Features:
- Protect against credential theft
- Achieve regulatory compliance
- Reduce risk of data breaches
Better Protection. Better Security. A Better Business.
* Verizon 2017 Data Breach Investigations Report 10th edition
Network Infrastructure – Scans, Firewalls, and Monitoring
When was the last time you scanned your network for vulnerabilities?
At StratusPointIT we can scan, analyze, and remediate network vulnerabilities, and improve your security. A key element of protecting your Network is ensuring you have leading business-class firewalls installed with proper security controls. We can purchase, install, and manage the firewall environment for you.
Key Features:
- Active-device monitoring and alerting
- Remote configuration and troubleshooting
- Network scans for vulnerabilities
- Firewall solutions
Advanced Endpoint Security
Did you know 76% of respondents of a recent survey who had been compromised say the attack was a new or unknown zero-day attack? *
A key element to implementing a Detection and Response service is also utilizing Next-Gen Antivirus (NGAV). NGAV uses a combination of innovative technologies to prevent known and unknown threats. From known malware to detecting stealthy activities whether endpoints are on or off the network by using artificial intelligence, behavioral detection, and machine learning algorithms. NGAV uses these innovative technologies to stop rapidly evolving threats by looking at the tactics, techniques, and procedures (TTPs) used by adversaries, not just the file signature like traditional (legacy) antivirus solutions.
Endpoint Detection and Response:
Endpoint Detection and Response (EDR) is a cybersecurity solution that uses Next-Gen Antivirus (NGAV) and also detects and mitigates cyber threats by continuously monitoring endpoint devices and analyzing endpoint data in real time. This solution will provide a platform for internal IT professionals to contain, investigate and remediate compromised systems.
Managed Detection and Response:
Managed Detection and Response (MDR) combines Endpoint Detection and Response (EDR) with a 24/7/365 Security Operations Center (SOC). Though an EDR solution provides you the platform to investigate and remediate threats, it still requires human intervention. A MDR solution provides a certified team of security professionals that will provide monitoring, incident response and remediation services to help keep your business safe.
* Ponemon Institute State of Endpoint Security Risk
Security Information & Event Management (SIEM)
Did you know 75% of business decision makers and 83% of IT decision makers are concerned their organization will be the target of a cybersecurity attack in the next 6 months? *
Monitor and safeguard your data by implementing a SIEM.
SIEM combines security information management (SIM) and security event management (SEM). Security Information and Event Management (SIEM) offers real-time monitoring and analysis of events as well as tracking and logging of security data for compliance or auditing purposes.
SIEM is a type of software that is used to detect, prevent, and help resolve cybersecurity incidents. It captures event data from a wide range of source across an organization’s entire network. Logs and flow data from users, applications, assets, cloud environments, and networks is collected, stored and analyzed in real-time.
Key Features:
- Collects log and event data from an organization’s network devices, firewalls, wireless access points, and more.
- Detecting threats on your network by continuous security monitoring of your network’s logs
- Established detection and response procedures to reduce or eliminate emerging threats.
- Solve regulatory and compliance requirements (HIPAA, NIST, CSF, CMMC).
* The State of SMB Cybersecurity in 2021 survey conducted by Vanson Bourne and commissioned by ConnectWise
Password Manager
Did you know 68% of workers put their employers at risk by using weak or reused passwords? *
How can you remember all your passwords? Poor password hygiene puts your company at risk of a data breach. The constant request of password resets reduces efficiencies within your team, and your IT organization. Implementing a Password Manager empowers your team by reducing unnecessary password resets, ensures employees are practicing strong password hygiene and allows for secure password sharing.
Key Features:
- Manage passwords from one place
- Protect your sensitive data
- Share passwords securely, between employees or external clients
- Customizable policies
- Audit Trails with advanced reporting
- SOC2, SOC3, C5 and GDPR compliant
* LastPass 2021 Report
Security is about layers working together to protect your data.

What our customers say
If you are pondering on should I hire or outsource my IT department look no further than ComputerSupport.com. Here is a company that will keep your business technology running smoothly and continues to bring new opportunities to your business. We are extremely satisfied with ComputerSupport.com and all their employees, this has been the best decision and direction our company has gone, I only wish we did it years ago. They are very professional, responsive and give you everything you need to improve your business.
The time had finally come for our accounting firm to overhaul our operating system & network. Though a seemingly daunting task to us, ComputerSupport.com seamlessly integrated our current software with the new system with minimal down time. Couple this with knowledgeable & responsive support makes ComputerSupport.com the right choice for us.
We chose Computersupport.com in October 2010 as our outsourced information technology provider. We were looking for a company that would serve as a true business partner with us as we continue to grow our business. In addition to replacing our front office system we moved our headquarters location last year. The team at ComputerSupport served as a tremendous resource as we selected a new internet service provider, new phone system provider and moved our servers to a new location. They have provided consistently good support and have become a trusted advisor.
We engaged ComputerSupport.com to help us ensure our Amazon Web Service deployment was always available and properly protected. The ComputerSupport.com team helped us understand and overcome the risks, and showed us best practices and cost savings that we took advantage of. We are happy with the result.
Computersupport.com was selected as our IT Service Provider offering a secure, cost effective and simple solution to our complex IT needs. The 100% cloud based solution we chose is a perfect fit for our entire team. It provides safe and fast access to all company data and email regardless of location.
As a financial firm we are required to adhere to strict compliance rules and regulations with a focus on data/email archiving, protection and retention. Computersupport.com provided us a solution that met all those requirements and offered the peace of mind that our firm was looking for.
Computersupport.com was able to offer SCS Energy an extremely cost-effective and functional set of solutions to our rapidly changing Information Technology needs. We have been extremely pleased with the implementation process for our ITAnyWhere Cloud and Egnyte systems and look forward to continuing our long-standing successful working relationship with Computersupport.com
Since switching to ComputerSupport.com outsourcing services about 2 years ago, my team was able to realize the expertise and agility of a true outsourced partner to accomplish our projects faster and get the right level of support when needed.
The decision to outsource our helpdesk and network management with ComputerSupport.com has been one of the largest technology victories for SCA this year. Having you team supporting our 200 users and coast to coast operation has allowed me to sleep better at night. Your assistance in opening two new regional offices as well as completing our nationwide MPLS network made the projects feel easy.
Other than the network and server management, which is huge, having our own full time help desk resource on site at our main office as well as your ability to get hands on help into any of our remote locations from New Hampshire to Alaska has been key to providing the support our uses have needed and deserve.
We outsourced the business of running our network to ComputerSupport.com. The wide variety of expertise they bring to our company not only in running the existing network but in the telecom area, planning for growth and budgeting has been a tremendous asset. Our company is no longer reacting to adverse network issues; instead we are in a proactive mode of operations. I’m very pleased with our decision to outsource to ComputerSupport.com.
Computer Support did a great job helping us relocate. Our staff was up in running this morning without a hitch. Farkhad was a pleasure to work with and smoothly handled any of our many requests during the start-up. Liam planned the relocation project very well. The entire Computer Support team did a great job!
ComputerSupport.com took over managing our IT and migrated our insurance firm to the ITAnyWhere Cloud platform. This has enabled us save money by not having to maintain on-premise hardware, and allowed my agents to work easily from anywhere. As a senior executive at the organization, ComputerSupport.com removed the IT headaches completely, and allowed me and my team to focus on my business. I would recommend ITAnyWhere Cloud to other firms in my industry.