Business Computer Security Ransomware Protection for Tampa Bay & Pinellas County

Mobile Tech Business Services 
Computer Security Business Ransomware Protection


Is your business secure against cyber attacks?  Are you able to recover from a Ransomware Attack?

Mobile Tech uses a layered approach to computer security. We install and monitor end point solutions to protect your business and your data.  A documented and tested backup recovery plan is critical to recover from cyber attacks. 

Tampa Bay and Pinellas County business owners have been a constant target of cyber criminals since 2017.  

" In brief: It's starting to look as if Florida cities have become the favorite target for ransomware attacks" ~ The TechSpot, July 1, 2019 ~

"71% of Ransomware Attacks Targeted Small Businesses in 2018" ~ Health IT Security, March 27, 2019 ~

That means businesses from tiny Belleair Bluffs to larger areas like the city of St. Petersburg — are well aware of the threats hackers pose.


“Ransomware is a growing trend right now because (hackers) saw potential,” said Miloslava Plachkinova, interim director of the University of Tampa’s cybersecurity program. She said cyber criminals “saw organizations and governments were not doing enough to protect themselves.”


Allan Liska, an intelligence analyst with Recorded Future, said ransomware attackers tend to be opportunists, looking for weak systems.  He said that tends to be smaller or mid-size towns that “don’t necessarily have the money to put the protections in place to keep the bad guys out.”


Tampa and across the bay, St. Petersburg faces perpetual threats of system-wide ransomware breaches.

71% of Ransomware Attacks Targeted Small Businesses in 2018

"About 70 percent of ransomware attacks in 2018 targeted small businesses, with an average ransom demand of $116,000, according to a recent report from Beazley Breach Response Services.

Beazley researchers analyzed 3,300 ransomware attacks against their clients last year and found the highest ransom demand was $8.5 million. The highest demand paid by one of their clients was $935,000."

As a whole, ransomware attacks have increased 11 percent from the past year, with 206.4 million attacks, according to recent SonicWall research. The increase is due to hackers mixing and matching malware components to create new variants, which makes it more difficult for tech to detect and identify these threats.

These attacks have increased 133 percent during the last year. These cyberattacks begin with credential theft by phishing or malware campaigns"

Network Hardware Review

• Firewall
- Stateful vs. stateless
• VPN concentrator
- Remote access vs. site-to-site
• NIPS/NIDS
- Signature-based
- Heuristic/behavioral
• Router
- ACLs
- Antispoofing
• Switch
- Port security
- Loop prevention
- Flood guard
• Access point
- SSID
- MAC filtering
- Signal strength
- Band selection/width
- Antenna types and placement
• DLP
- USB blocking
- Cloud-based
- Email
• NAC
- Dissolvable vs. permanent
- Host health checks
- Agent vs. agentless
• Mail gateway
- Spam filter
- DLP
- Encryption

Penetration Test & Vulnerability Scan

• Protocol analyzer
• Network scanners
- Rogue system detection
- Network mapping
• Wireless scanners/cracker
• Password cracker
• Vulnerability scanner
• Configuration compliance scanner
• Exploitation frameworks

Computer Security Tools

• Data sanitization tools
• Steganography tools
• Honeypot
• Backup utilities
• Banner grabbing
• Passive vs. active
• Command line tools

Are your computer systems secure?

Our computer security review troubleshoots common security issues.

Unencrypted credentials/clear text
• Logs and events anomalies
• Permission issues
• Access violations
• Certificate issues
• Data exfiltration
• Misconfigured devices
- Firewall
- Content filter
- Access points
• Weak security configurations
• Personnel issues
- Policy violation
- Insider threat
- Social engineering
- Social media
- Personal email
• Unauthorized software
• Baseline deviation
• License compliance violation
(availability/integrity)
• Asset management
• Authentication issues
Book Service
Share by: