• our approach

Security Resiliency Matrix

Most security risk encountered by Vancord with its customers can be managed through simple, common-sense practices built atop a strong foundation. The Vancord security roadmap presented below is based on this notion. Many customers likely require only a small subset of these activities, while some with greater exposure and obligations warrant more comprehensive effort.

Our Approach image

Customized Cybersecurity Solutions Tailored for Your Unique Protection Needs

Vancord strives to understand the specific business and risk tolerance of every customer, and its recommendations are tailored to those characteristics. Organizations differ and the rigor required to protect them do, too. Businesses with health data or government contracts have different requirements compared to educational institutions and non-profits. Through collaborative discussions, Vancord identifies the needs of every customer to find a best fit.

Many businesses are tired of expensive security protections that fail to deliver despite being advertised as a silver bullet. Our goal is to measure risk through observation to provide guidance, achieving and maintaining a secure environment, and to craft appropriate solutions for likely threats.

Security Resiliency Matrix

First Steps
Security Fundamentals

Fundamental

Vulnerability Management

Vulnerability Assessment
Patching

Network Security

Local Server Firewalls
Secure Wireless
Perimeter Firewalls

Log Collection & Review

Logs Collected Locally

Data & Asset Inventory

Server Inventory

Identity & Access Management

Remote Access MFA
Endpoint Management
Data Inventory
Password Manager

Data Protection

Email & Phishing Defense
Antivirus
Simple Local Backups

Security Awareness & Training

Security Awareness Training

Policy & Incident Management

Know Compliance Requirements
Written Information Security Plan
Written Information Security Policy
Incident Response Plan

Enhance and Enforce

Vulnerability Management

Quarterly Vulnerability Scanning

Network Security

Network Segmentation
Guest Wireless

Log Collection & Review

Logs Collected Centrally

Data & Asset Inventory

Data Flow Diagrams

Identity & Access Management

Administrative MFA

Data Protection

Offsite Backups
Endpoint Detection and Response (EDR)

Security Awareness & Training

Security Awareness Training
Incident Response Training

Policy & Incident Management

Security Leadership
Cyberliability Insurance

Validate and Sustain

Vulnerability Management

Security Maturity Assessment
IT Risk Management
Penetration Testing

Network Security

Advanced Firewalling
Web Application Firewall (WAF)
Activity Correlation Engine

Log Collection & Review

Security Operations Center (SOC)

Data & Asset Inventory

Data Governance

Identity & Access Management

Enterprise MFA

Data Protection

Single Sign On (SSO)
Disaster Recovery Planning

Security Awareness & Training

Security Awareness Training
Red/Purple Team Exercises