Kim Scofield

Online Security Consulting, Rescue, and Monitoring

Hi! - My name is Kim and I am a cybersecurity consultant.

I work with mainly enterprise level clients, but I also love to work with small and medium businesses when they find me. Whatever size business, educational institution, not-for-profit, sports team, etc. you are responsible for, together we can look at your needs, wants, and vision.

Custom development

  • Upgrade or add to your existing technology
  • Design new technology for that next step in your business roadmap.
  • Help you optimize the usability and cost of your current platforms, while creating a sleek, secure technology framework.

Security

Everyone needs to know how to stay safe online - business, friends, family, and you.

Small, Medium, and Enterprise businesses also need to stay compliant with ever-changing privacy and legal requirements.

Let's map out where you are, where you need to be, and how you will get there!

Together we can also create an emergency plan, and BadWolf can even be on call in case of emergency - to get you back online quickly and safely.

What is Online Security and why do I care??

Free, 30 mins

Let's talk about Online Security. What is it, exactly? Why do you need to care, and what is required to be protect your people, keep data safe and stay compliant in your business, school or organization? Bring your questions! See how you're doing as you follow along and fill in your "Security Essentials Checklist". Join us at one of the event times below and - depending on your timezone - bring your breakfast, lunch, or coffee!

Online Security Consultation: Legal & Privacy Requirements

$150 for 1 hour

Everyone needs to know how to stay safe on line: businesses, friends, family, and you. This Consult addresses basic security risks for people, passwords, and home/office access to accounts and platforms. Small, Medium, and Enterprise businesses also need to stay compliant with ever-changing privacy requirements, and the requirements of their legal department.

Security Assessment: Tech Infrastructure and People

$500 for 2 hours

Today's businesses combine many online platforms in order to keep things running smoothly: cloud storage, email, online meetings, social media, marketing funnels, and more. To make this work, everything must to connect seamlessly with everything else. Every connection means shared access. Every point of shared access is a potential entry point for criminals. We'll check (1) security issues (2) human error. Careless / untrained employees and leadership can open your org to HUGE ransomware and other issues. We'll outline what's in place (tech, connection points, security education, etc.) and the most important gaps are in security and legal compliance. Results will be in-depth as possible, depending on the size of your organization.

Timezone:
Loading timezone...