IT Security
Identity Theft Protection
Credential Theft Prevention & Identity Protection
Breached Identities are the biggest, most damaging and most widespread threat facing small businesses. S3 Technologies layered security approach ensures your users check all boxes before they are granted access as part of the prevention of credential theft and overall identity protection.
365 Business Identity Protection
validate whether an account has been compromised or not. In the case that an account has been compromised, our team will remediate the situation followed by a thorough investigation to determine the extent of the compromise. Awareness of all activity and sign-in traffic is a key element in credential theft protection.
Preventing« Brute Force » Attacks
Dark Web Compromised Credential Monitoring
Two Factor Authentication (2FA) Monitoring
Privileged Security Group Protection
Frequently Asked Questions
We have developed a backup security standard to keep backups safe from attackers who will look to compromise them in a ransomware attack. We built our standard with the assumption that the network will be breached and that the attackers will obtain admin rights. Therefore, we completely segregate the backups from the network and put in place their own authentication. Our offsite backups also have ransomware protection built-in which allows for recovery if ever they were to be deleted. Our backup standard withstood penetration testing by multiple specialized security firms. We adapt our backup security standards constantly as the attackers change their tactics.
22 years! S3 was founded by Marc, Vince, and myself in June 2003 after we all graduated in computer engineering together. Our vision was to become an outsourced IT department for SMBs which is still what we are today. We were, therefore, a Managed Service Provider before the term was used.
We are still the three sole owners of S3 and work hard at it every day.
Yes, you absolutely should. Unfortunately, even though we are very confident in our abilities to protect you against cyber attacks, nothing can be 100% secure. Insurance is an important part of your response plan.
The security standards that we deploy will make sure that you will be insurable, and we will help you answer all the questions the insurers will have, and they will have a lot. We can also help validate that the proposed coverage makes sense for your business.
Our typical client is an SMB based in the Greater Montreal, often with additional offices across Canada or the U.S. Many operate in a hybrid work model, and some are fully remote.
They all have in common that they take cybersecurity and employee productivity very seriously. They want IT to drive their business forward, not hold it back.
Our clients are in different industries:
- 60% are professional services firms
- 40% are in distribution or manufacturing
They all operate within the Microsoft ecosystem, using tools like Microsoft 365, Windows, and Azure. Most have a mix of cloud and on-premise infrastructure, while others are fully cloud-based.
We support two types of clients:
- Businesses without internal IT staff, where we act as their fully managed IT department
- Businesses with internal IT teams, where we work collaboratively with their IT team to extend their capabilities
Clients usually find us when they outgrow their IT provider or their IT team needs help.
Our other IT security services