Identity theft protection
Credential Theft Prevention & Identity Protection
Breached Identities are the biggest, most damaging and most widespread threat facing small businesses. S3 Technologies layered security approach ensures your users check all boxes before they are granted access as part of the prevention of credential theft and overall identity protection.
365 Business Identity Protection
validate whether an account has been compromised or not. In the case that an account has been compromised, our team will remediate the situation followed by a thorough investigation to determine the extent of the compromise. Awareness of all activity and sign-in traffic is a key element in credential theft protection.
Preventing« Brute Force » Attacks
Dark Web Compromised Credential Monitoring
Two Factor Authentication (2FA) Monitoring
Privileged Security Group Protection
Frequently Asked Questions
We have developed a backup security standard to keep backups safe from attackers who will look to compromise them in a ransomware attack. We built our standard with the assumption that the network will be breached and that the attackers will obtain admin rights. Therefore, we completely segregate the backups from the network and put in place their own authentication. Our offsite backups also have ransomware protection built-in which allows for recovery if ever they were to be deleted. Our backup standard withstood penetration testing by multiple specialized security firms. We adapt our backup security standards constantly as the attackers change their tactics.
19 years! S3 was founded by Marc, Vince, and myself in June 2003 after we all graduated in computer engineering together. Our vision was to become an outsourced IT department for SMBs which is still what we are today. We were, therefore, a Managed Service Provider before the term was used.
We are still the three sole owners of S3 and work hard at it every day.
Yes, you absolutely should. Unfortunately, even though we are very confident in our abilities to protect you against cyber attacks, nothing can be 100% secure. Insurance is an important part of your response plan.
The security standards that we deploy will make sure that you will be insurable, and we will help you answer all the questions the insurers will have, and they will have a lot. We can also help validate that the proposed coverage makes sense for your business.
Our typical client is an SMB with a head office in the greater Montreal area. Many of our clients also have other offices throughout Canada and the US. A good proportion of them have hybrid office models and some work entirely from home.
Our clients take the security of their data and the productivity of their people very seriously. They want to ensure that their IT enables them to meet their business goals and does not hold them back.
Our clients are from different industries. 60% are professional service firms and the other 40% are in distribution or manufacturing.
Our clients are in the Microsoft ecosystem. They mostly use Windows, Office 365, Azure. The majority have a mix of cloud and on-premise infrastructure. The others have a purely cloud infrastructure.
Most clients have no full-time IT people. Some have a small IT team that are focused on their line of business applications.
Clients usually find us when they outgrow their IT provider, or they lose an internal resource and decide they do not want to manage IT people anymore.
Looking for a new IT supplier?
- You will be taken care of by a designated team.
- You will be able to focus on running your business.
- You will have a true partner who cares about your success.
- You will be able to take advantage of the latest technologies for greater efficiency.
"*" indicates required fields