Lead the Pack:

Cybersecuirty Essentials- Built for small and medium-size businesses

$95 per user per month + applicable taxes

Create confidence with your clients and protect your business with the most agile security solution available for Small and medium-sized businesses. Sleep well at night knowing you have an expert team on your side who are staying up-to-date, so you don't have to. This is an enterprise-level suite of products and services that stops cyber intruders, helps you meet new regulatory guidelines, prepares you for what to do in case of an attack, and gets your business back up and running in the event one is successful. No more guessing if you are doing all the right things; with Essentials, you are now ready to lead the pack. 

* Includes Two Devices per user-> $15 each additional. Contact Us for Team Pricing.

What’s Included:

Everything you need to be safe and staying ahead. With over seven layers of security, you can now allocate more head space to running your business.

  • Yes, this is part of the package:). Sleep well, knowing you are doing everything you can. Experts have put together this managed security suite of products and services. This means you don’t have to think about whether your programs are the best ones or if you have enough layers of security. We take this on and if we see way to improve the offering we will add to it, or make changes so you don’t have to lift a finger.

  • Experts on call. You get two full teams protecting and overseeing your devices, our Primary Team and a Security Operations Center. The SOC is staffed 24/7 and can respond to after-hours/emergency threats when our PT is asleep or on holiday. Our SOC will immediately isolate and terminate threats and send a case review to our local Primary Team for follow-up should an event occur late at night or over a holiday.

  • They say, “If you fail to plan, you are planning to fail,” so we get you going in the right direction. We help you remove any self-doubt, improve your confidence and be ready for third-party stakeholders who will need to know your security procedures. Cyber security is much more than just software programs and firewalls; much of it comes with how you operate and follow recommended best practices. We provide you with customizable plans/templates that will ensure you are taking all the necessary steps as well as not overburdening you with crippling procedures that slow you down. Don’t worry if your Staff, Regulatory bodies, cybersecurity insurance providers, or even a courtroom come asking; we have you covered.

    What’s included :

    1.) WFH Policy/Clean Desk Policy

    2.) IT/Computer use policy

    3.) Business Continuity Plan

    4.) Breach Incident Response Plan Template

    5.) Employee Intake/Exit Process Template

    6.) NDA/Subcontractor Agreement

    7.) Destruction of Data Plan/Template for retired hardware *** Will be available for all clients early 2024***

  • Imagine only having to remember one password ever again but getting the security of unique passwords for every other login. Not all password managers are created equal, we select the best one for you. Don’t get caught using the free password manager in your browser or devices ( Chrome, Apple, Edge, etc); these have limited functionality and can be accessed once inside a device. We also monitor any potential logins from unknown devices and scan the internet to see if your data may have been taken from a third-party breach so you can update your passwords and remove any future threats.

  • Most cyber-criminals target your email first. We set up a layer of protection BEFORE emails land in your Office 365, Gsuite, etc mailbox. Enhanced scanning is taken on each email.

  • You may have hundreds of thousands of old emails in your inbox collected over the years. We will dig through all of them and catch anything dormant or anything new if it was missed on delivery or a link was inadvertently clicked by a user.

  • If something does make it past your email, there will be the most sophisticated programs ready to attack, quarantine and remediate any malicious threats. In computer-speak, these are MDR, EDR, XDR programs. Some are running the most sophisticated behavioural Ai scanning that can even detect new viruses. All programs are picked and updated to be the best on the market. All you need to do is set it and forget it:).

  • Once an intruder is through the door and looking at the information they want, we make sure the files are encrypted so it keeps slowing down intruders. We also investigate if your hardware is properly configured to protect any local data that could be manually removed and connected elsewhere.

  • >82% of all cyber-attacks are due to human error. Due to clicking the wrong thing, sharing too much information online or not working in a safe environment. We enroll you in the most up-to-date cybersecurity training to ensure you are keeping pace with the new threats facing your industry. You get fun interactive videos and quizzes sent to your email on a regular interval that you set.

  • Sometimes, the worst can happen, and a breach occurs.*** Not yet for Our BVigialnt clients….*** But if Equifax can be hacked, eventually, so can you. We will have all your email and cloud data backed up and ready for you to get your business up and running right away. We also have a proprietary way of tracking what a threat did when it was detected so we can ensure there’s no residual damage or further threat. Often times the first move will be to steal something or install a “backup” malware infection in case the primary one breaks. Our security team can now see all actions taken and remediate them in reverse order to ensure no further risk.

  • By choosing the Essentials package you are able to use the BVigilant shield to place on your website or marketing to show you are protected and keeping your client’s information safe.

Optional Add-On:

  • We search and find resources on the dark web that cybercriminals might use to execute their attacks, such as leaked credentials and software vulnerabilities. We give you visibility into dark web traffic to and from your network, a key indicator of malicious activity.

  • Also called a (pen test) is an authorized simulated attack performed on a computer system to evaluate its security. Penetration testers use the same tools, techniques, and processes as attackers to find and demonstrate the business impacts of weaknesses in a system. There are multiple levels of pen tests. Costs range from $200- $10,000 depending on the size of your organization and thoroughness of the test.

Do you have what it takes to lead the Pack?

Take the cybersecurity assessment below. Instant scoring on how well you do compared to industry standards.