Trusted Professionals with Security Solutions

Diversions Managed Services and Cyber Security Solutions are provided via a Service Contract where we provide an enhanced level of agreed upon service and support to your business and IT infrastructure.

Whether you are looking to ensure that your computers are protected by Anti-virus and Endpoint Detection and Response (EDR), or that your data is secure and backed up from just one computer, all computers, and your server. Diversions can customize a managed service and protection contract specific to your unique needs.

If you are concerned about the impact a Cyber Attack would have on on your business or organization, and if you have considered purchasing Cyber Insurance for your business, you should give us a call.  We can review your current exposure and determine the appropriate solutions specific for your needs.  Diversions offers a combination of security tools that will qualify you to get an over 30% reduction in your Cyber Insurance policy rates.  Details available.  Give us a call.

Services include:

What Our Customers Say

“Diversions has been our trusted partner for all things IT related for more than 15 years.”

Kristen Rose

Business Manager

Mills Pittman Twyne Law Offices

“We rely on the professional team at Diversions to provide us with the technical products and services needed to remain efficient and competitive.   Our continued partnership, which has lasted over a decade, is indicative of the quality of services we receive. Diversions have supplied and managed our Computers, Server, Backups, Phones, Email, Mobility, Networking and IT Security. In addition, they have become a trusted advisor and consultant on system upgrades, off-site data backup operations and routine service plans. When our systems require onsite support, the team from Diversions are prompt and very respectful and courteous to our staff. We thank Diversions for their many years of service and look forward to many more.”
Lee Bennett, P. Eng,  VP – Operations, Senior Civil Engineer
Meridian Engineering Inc.

“As our company has grown over the years, the Diversions team has been there for us every step up the way providing advice, equipment, and results to ensure our IT systems perform.”

Ena Young

Financial Controller

Youngs Industrial Refrigeration & Fabrication

Remote Monitoring and Management

At the center of what we do is a Remote Monitoring and Management solution or RMM.  RMM is a set of tools and software that allows us to monitor the health and performance of computers, servers, and networks remotely. This means we can identify issues, implement solutions, and maintain systems without needing to be physically present.

Benefits of RMM:

Efficiency – RMM allows for proactive management of IT resources, reducing downtime and ensuring that systems are always operational. This means your staff can perform their duties without interruptions.

Example: If a network issue arises, the IT team can resolve it quickly without waiting for someone to report the problem or physically visit the site.

Cost-Effective – By reducing the need for on-site visits, RMM can lower operational costs. IT teams can manage multiple devices across various locations from one centralized platform.

Example: If the town has multiple community centers with computers, RMM allows the IT team to manage all these centers from a single location, saving time and travel expenses.

Enhanced Security – RMM systems can quickly identify security threats, apply patches, and ensure that antivirus software is up to date. This is crucial for safeguarding sensitive town systems and data.

Example: If a new virus is detected, the RMM system can automatically update all town devices to protect against it, ensuring that sensitive resident data remains secure.

Improved Communication – RMM tools can provide real-time insights and reporting, allowing for better decision-making. You can receive updates on the performance of IT systems, which can aid in budget planning and resource allocation.

Example: Regular reports from the RMM system can help you understand the IT needs of the town and make informed decisions about future investments in technology.

Conclusion – Remote Monitoring and Management (RMM) is a vital tool for modern town management. It enhances the efficiency, security, and cost-effectiveness of IT operations, ensuring that your staff has the reliable technology they need to serve the community effectively. By investing in RMM, you can streamline operations and focus more on the strategic goals of your town.

Anti Virus and EDR

Crucial on the list of securing your IT operations is Anti Virus and Endpoint Detection and response:

  • Antivirus software is a program designed to detect, prevent, and remove malware (malicious software) from computers and networks. It primarily focuses on protecting devices against known threats by scanning files and programs for signatures of malware.
  • EDR is a more advanced cybersecurity solution that not only detects threats but also responds to them. It continuously monitors endpoint devices (like computers and servers) for suspicious activity and provides tools for investigation and remediation.

Summary of Differences:

Scope of Protection: Antivirus focuses on known threats, while EDR is designed to detect both known and unknown threats using more advanced techniques.

Response Mechanisms: Antivirus typically deletes or quarantines malware, whereas EDR provides a comprehensive response, including investigation and remediation tools.

Monitoring & Analysis: Antivirus conducts periodic scans, while EDR continuously monitors endpoints for suspicious activities and provides detailed analysis.

Why Have Both?

While antivirus software provides essential protection against known malware, EDR offers advanced capabilities for detecting and responding to more sophisticated threats. Using both together enhances your security posture, providing comprehensive protection against a wide range of cyber threats. For organizations, this layered approach is crucial in today’s evolving threat landscape.

Real-World Scenarios:

Scenario 1: A user downloads a file that appears safe but contains a new type of malware that is not yet in the antivirus database. The antivirus fails to detect it, but EDR monitors the endpoint and identifies unusual behavior, alerting the IT team to investigate further.

Scenario 2: An employee inadvertently clicks on a phishing link that installs malware. The antivirus software quarantines the infected file, while the EDR tracks the actions taken by the malware, assesses the impact, and helps to remediate any damage done.

In summary, while antivirus software is essential for basic protection against malware, EDR provides a deeper level of security, focusing on real-time detection and response to a broader range of threats. Organizations should assess their specific security needs to determine which solution—or combination of solutions—best fits their requirements. For a robust cybersecurity posture, especially in larger or more targeted environments, EDR is often the recommended choice.

Ransomware Detection

Ransomware detection is a critical aspect of cybersecurity that involves identifying and mitigating ransomware threats before they can cause harm. Ransomware is a type of malicious software (malware) that encrypts a user’s files or entire systems, making them inaccessible until a ransom is paid to the attacker.

Importance of Ransomware Detection

Early Identification: Quick detection can prevent data loss and minimize downtime by allowing organizations to respond before the ransomware has fully executed its attack.

Incident Response: Effective detection enables immediate response actions, such as isolating affected systems to prevent the spread of ransomware and initiating recovery processes.

Compliance: Many regulations and standards require businesses to implement measures to protect against malware, including ransomware. Effective detection helps meet these compliance requirements.

Tools for Ransomware Detection

Endpoint Detection and Response (EDR):

EDR solutions provide continuous monitoring of endpoints and can detect suspicious activities associated with ransomware.

Example: EDR platforms can provide alerts when unusual file encryption patterns are detected on a company laptop.

Intrusion Detection Systems (IDS):

IDS tools monitor network traffic for signs of malicious activity, including communication attempts to known ransomware C2 servers.

Example: If a device tries to connect to a known malicious IP address linked to ransomware, the IDS can alert network administrators.

Backup and Recovery Solutions:

While not a detection tool per se, having robust backup solutions can help organizations recover from ransomware attacks and minimize the impact.

Example: Regularly backing up important data allows organizations to restore files without paying the ransom if an attack occurs.

Conclusion: Ransomware detection is an essential part of a comprehensive cybersecurity strategy. By employing a combination of behavioral analysis, file integrity monitoring, signature-based detection, heuristic analysis, and machine learning, organizations can effectively identify and respond to ransomware threats. Investing in the right tools and practices helps protect critical data and maintain operational continuity in the face of evolving cyber threats.

Managed Patching and 3rd Party Patch

Managed patching refers to the systematic process of keeping software and operating systems up to date by applying patches, updates, and fixes automatically or with minimal manual intervention. This is an essential part of maintaining the security and functionality of IT systems within organizations.

3rd Party Patching refers to the same process as with operating systems but to other software and applications that you have installed on the operating system.  A common example being Adobe reader.

Definition: A patch is a piece of software designed to update or fix issues in an existing program or operating system. Patches can address security vulnerabilities, improve functionality, or fix bugs.

Example: A security patch might be released by Microsoft to fix a vulnerability in Windows that could be exploited by malware.

Key Components of Managed Patching

Automated Updates:

Managed patching automates the process of checking for, downloading, and installing patches. This helps ensure that systems are consistently updated.

Example: An RMM tool can be configured to check for available updates every night and install them automatically during off-hours to minimize disruptions.

Centralized Management:

With managed patching, our team can manage patches for all devices from a single dashboard. This allows for easier oversight and control of the patching process across the entire organization.

Example: The IT team can view the status of patch deployment for all workstations and servers in real-time, making it easier to identify systems that require attention.

Testing and Validation:

Managed patching solutions often include features to test patches in a controlled environment before deploying them widely. This helps prevent issues that may arise from faulty patches.

Example: A critical patch can be tested on a few machines first to ensure that it doesn’t cause compatibility issues with existing applications before being rolled out organization-wide.

Scheduling and Compliance:

Patching can be scheduled to occur at specific times to minimize disruption to users. Additionally, managed patching helps organizations comply with industry regulations that require regular updates to software.

Example: An organization might schedule patch deployment over the weekend to ensure all updates are applied before employees return on Monday.

Reporting and Alerts:

RMM tools with managed patching capabilities often include reporting features that provide insights into the patching status, compliance levels, and any issues encountered during the process.

Example: The IT team receives notifications if a patch fails to install on certain machines, allowing them to address the issue promptly.

Benefits of Managed Patching

Enhanced Security:

Regularly applying patches helps protect systems from vulnerabilities that can be exploited by cybercriminals. This is crucial for safeguarding sensitive data and maintaining trust.

Example: By applying security patches promptly, an organization can significantly reduce its risk of experiencing a data breach.

Reduced Downtime:

Automated patching minimizes system downtime by ensuring updates are applied during off-hours and reducing the need for manual intervention.

Example: Scheduled updates can be completed overnight, allowing users to access systems without interruptions during business hours.

Efficiency:

IT staff can focus on more strategic tasks rather than spending time manually managing patches. This leads to better resource allocation within the IT department.

Example: With managed patching, IT personnel can concentrate on projects like improving network security rather than performing routine patch management.

Compliance:

Many regulatory frameworks require organizations to maintain updated software to protect sensitive information. Managed patching helps meet these compliance standards.

Example: A healthcare organization can ensure it remains compliant with HIPAA regulations by keeping its software up to date and secure.

Conclusion: Managed patching in RMM is a vital component of a robust IT strategy. By automating the process of applying software updates and security patches, organizations can enhance their security posture, reduce downtime, and improve operational efficiency. Implementing managed patching not only helps protect sensitive data but also ensures compliance with industry standards, making it an essential practice for businesses of all sizes.

Block Hours Contracts

A Block Hours Contract is a service agreement between a Managed Service Provider (MSP) and a client that allows the client to purchase a predetermined number of service hours in advance. These hours can be used for various IT support services, such as help desk, on-site technical support, troubleshooting,  or system maintenance. This model offers clients flexibility and predictable budgeting while providing MSPs with a steady stream of business.

Key Features of a Block Hours Contract

Pre-Purchased Hours:

Clients buy a specific number of hours upfront, usually at a discounted rate compared to standard hourly billing.

Example: A business might purchase 100 block hours for IT support, which can be used over a specified period, such as six months.

Flexible Usage:

Clients can use the purchased hours as needed for different services, allowing them to allocate resources based on their specific requirements.

Example: A client might use 30 hours for server maintenance, 20 hours for user training, and the remaining hours for helpdesk support.

Expiration Policy:

Many block hours contracts have an expiration date, meaning that any unused hours may not carry over beyond a certain period. Clients need to be aware of this to maximize their investment.

Discounted Rates:

Block hours are usually offered at a lower rate than standard hourly fees, providing cost savings for clients who anticipate regular use of IT services.

Example: If the standard hourly rate is $100, a block hour might be offered at $80, providing savings of $20 per hour.

Simplified Billing:

Clients receive a more predictable billing structure, as they know how many hours are available for use and can budget accordingly.

Example: Instead of facing variable monthly bills based on usage, a client can plan their budget based on the upfront cost of the block hours.

Benefits of a Block Hours Contract

Cost-Effective:

Buying hours in bulk often leads to financial savings for organizations that require ongoing IT support, making it a budget-friendly option.

Example: A small business saves money over time by committing to a block hours contract instead of paying for each service request at the standard rate.

Access to Expertise:

Clients can access a range of IT services from experienced professionals without having to hire full-time staff, allowing them to leverage specialized skills only when needed.

Example: A company may need occasional network security assessments but does not have the resources to maintain a full-time security expert.

Predictable Spending:

By pre-purchasing hours, clients can more accurately forecast their IT expenses, aiding in financial planning and cash flow management.

Example: A company can allocate funds for IT support in its annual budget based on the block hours purchased.

Priority Service:

Clients with block hours contracts may receive prioritized service, ensuring their issues are addressed swiftly compared to non-contracted clients.

Example: An organization with a block hours contract may receive quicker responses from the MSP during peak times when resources are stretched.

Encourages Regular Maintenance:

Clients are more likely to schedule regular maintenance and support when they have hours already purchased, leading to better overall IT health and performance.

Example: A business may use its block hours for routine system checks and updates, preventing larger issues from developing over time.

Considerations When Entering a Block Hours Contract

Assessment of Needs:

Businesses should assess their IT needs and historical usage to determine the appropriate number of hours to purchase.

Example: If a business typically requires 15 hours of support per month, they might consider purchasing a block of 100 hours for six months.

Understanding Terms:

It is important for clients to understand the terms of the contract, including expiration policies and any restrictions on service types covered by the hours.

Example: Clients should clarify whether hours can be used for all types of services or if there are exclusions.

Conclusion: A block hours contract with a Managed Service Provider (MSP) offers businesses a flexible, cost-effective solution for accessing IT support and services. By pre-purchasing service hours, companies can benefit from discounted rates, predictable spending, and access to expert

Endpoint Backup

Endpoint Backup refers to the process of creating copies of data stored on devices such as laptops, desktops, mobile devices, and servers. This data can include files, documents, applications, and system settings. The goal of the backup is to ensure that, in the event of data loss—whether due to accidental deletion, hardware failure, malware attacks, or natural disasters—the data can be restored, and the user(s) can continue functioning with minimal disruption.

Key Features of Endpoint Backup:

Automated Backups:

Our backup solutions offer automated scheduling, setting specific times for backups to occur without manual intervention.

Example: the backup can be configured to run as often as every 15 minutes, ensuring that users latest work is always saved.

Versioning:

Versioning allows users to keep multiple copies of files at different points in time. This feature is useful if a user needs to restore a previous version of a document.

Example: If a user accidentally overwrites an important report, they can revert to a previous version saved in the backup.

Cloud Integration:

Diversions’ backup solutions store data in the cloud, providing off-site protection and accessibility from anywhere with internet access.

Example: A remote employee can access their backed-up files from any device, ensuring they can retrieve important documents even if their primary device is lost.

Encryption and Security:

To protect sensitive data, our backup solutions are encrypted both during transmission and at rest.

Example: A healthcare provider can back up patient data securely, ensuring compliance with regulations.

Why Should You Use Endpoint Backup?

Data Protection:

Endpoint backup serves as a safety net against data loss. Whether data is lost due to accidental deletion, hardware failure, or ransomware attacks, having a backup ensures that you can recover important information.

Example: If a laptop is stolen or damaged, Diversions team can restore all of the users files to a new device without losing any critical information.

Business Continuity:

In a business context, endpoint backup is essential for maintaining operations. Quick recovery from data loss minimizes downtime and helps organizations continue functioning smoothly.

Example: A small business can quickly restore its operations after a data loss incident, reducing potential revenue loss and maintaining customer trust.

Compliance and Legal Requirements:

Many industries have regulations that require organizations to maintain proper data backups. Endpoint backup helps ensure compliance with these regulations.

Example: Financial institutions must keep accurate records; having regular backups ensures they can meet regulatory requirements and avoid penalties.

Protection Against Ransomware:

Ransomware can encrypt a user’s files and demand a ransom for their release. With endpoint backups, organizations can restore their files without paying the ransom.

Example: If a company is hit by ransomware, they can wipe the infected device and restore all data from their backup, effectively negating the attack’s impact.

In summary, endpoint backup is a critical component of data management and security for both individuals and organizations. By protecting against data loss, ensuring business continuity, and helping meet compliance requirements, endpoint backup solutions provide peace of mind. Implementing a robust endpoint backup strategy is essential for safeguarding valuable information and maintaining operational efficiency in today’s digital landscape.

Security Awareness Training

An estimated 90% of security breaches are caused by human error, yet many organizations don’t have a program in place to protect the human attack surface. With Diversions’ security awareness training and phishing simulation solution, you can reduce your organization’s chance of experiencing a cybersecurity disaster by up to 70%.

  • Educate and empower employees to spot and stop phishing threats and follow cybersecurity best practices.
  • Automate training campaigns and reporting for effortless, set-it-and-forget-it training that gets results.
  • Satisfy requirements for cyber liability insurance purchase or renewal by having strong cybercrime protections — like a user security awareness training program — in place.
  • Maintain compliance with industry regulations and avoid high fees for non-compliance by conducting ongoing security awareness training.

Engaging Content

Choose from a rich set of plug-and-play phishing simulation kits and animated video lessons accompanied by short quizzes — and ensure that training reaches every employee no matter how tech-averse they are.

Seamless Automation and Reporting

Easily schedule training and phishing campaigns up to a year in advance. Reports show training results for the entire organization as well as individual employees and get delivered automatically to designated recipients.

Customizable Materials

Customize phishing emails, sending email addresses and attachments to your needs to mimic threats specific to your organization and increase training effectiveness.

Always-current training assets

Fresh phishing kits and videos are released monthly to reflect the current threat landscape and keep your employees on the lookout for trouble.

In summary, implementing security awareness training in your company is essential for protecting sensitive data, minimizing the risk of cyberattacks, and fostering a culture of security. By educating employees about potential threats and best practices, you empower them to act as the first line of defense against cybersecurity incidents. Given the increasing sophistication of cyber threats, a well-structured security awareness training program is a vital investment in your organization’s overall security strategy.

Dark Web Monitoring

Diversions Dark Web Monitoring service provides proactive protection with continuous Dark Web ID monitoring to detect compromised credentials. Real-time alerts and actionable insights help us swiftly mitigate risks, safeguard sensitive data, and strengthen clients’ security postures. By leveraging this solution, we can stay ahead of threats, enhance service offerings, and build long-term client trust.

Key Benefits:

  • Threat Detection: Identify compromised credentials before exploitation.‍
  • Instant Alerts: Get notified of threats early for a rapid response.
  • Stronger Security: Address vulnerabilities from leaked credentials.

Incorporating dark web monitoring into your company’s security strategy is a proactive approach to safeguarding sensitive information and mitigating risks associated with data breaches. By detecting compromised data early, enhancing incident response preparedness, and maintaining regulatory compliance, dark web monitoring helps protect your organization’s reputation and builds trust with customers. Given the increasing frequency and sophistication of cyber threats, employing dark web monitoring is a vital step in a comprehensive cybersecurity strategy.

Cloud Detection and Response (SaaS Alerts)

What is SaaS?  SaaS stands for Software as a Service, and it is a software distribution model in which applications are hosted in the cloud and made available to users over the internet. Normally provided through a monthly subscription and accessible from any device with internet connectivity.

The most commonly used examples of SaaS include Microsoft 365 and Google Workspace.

Cloud Detection + Response: SaaS Alerts automatically detects and remediates security breaches in SaaS applications, responding to suspicious behavior with immediate action.

We use machine learning pattern detection to identify anomalies in user behavior that might indicate a breach in your most critical SaaS applications. When an abnormal event is detected, we alert you immediately and respond quickly. Additionally our automated threat remediation capabilities will take action for you.

Here are just a few of the actions we will identify:

  • Bad actors successfully logging in from outside of approved locations
  • Internal or external actors exfiltrating data
  • Dangerous file sharing practices
  • Unauthorized SaaS application usage (shadow IT)
  • Security configuration changes
  • Unauthorized devices
  • Dangerous inbox rule behavior

SaaS Backup

SaaS Backup refers to the process of creating copies of data that is stored in Software as a Service (SaaS) applications. SaaS applications, such as Microsoft 365, Google Workspace, Salesforce, and others, allow users to access software over the internet without the need for local installations. While these platforms provide robust solutions for data management and collaboration, they often do not offer comprehensive backup and recovery options for the data created and stored within them. SaaS backup solutions are designed to fill this gap by ensuring that your data is protected and can be restored in case of loss or corruption.

Benefits of our SaaS Backup Solution:

Continuous SaaS Backups – Protect Microsoft 365 and Google Workspace applications against accidental or malicious deletion, ransomware attacks, and other cloud data loss with 3x daily, automated backups.

Simple, Per-License Pricing

Complete Control – Automated point-in-time SaaS backups capture relevant changes across both Microsoft 365 and Google Workspace in their entirety. Our solution also provides an independent backup copy of data outside of SaaS provider servers.

Recover Quickly – Restore lost data quickly with flexible restore options such as point-in-time, granular, and non-destructive restore.

Beyond Files and Folders – Our true SaaS backup solution protects not just files and folders, but collaboration tools like Microsoft Teams, SharePoint, OneDrive, and Google Drive.

Anti Phishing Solution (Email Protection)

Email is the most successful delivery method for the costliest cyberattacks out there: business email compromise, credential theft, ransomware, and more.

Diversions solution provides an automated phishing defense platform that protects you from cybercriminals posing as trusted contacts

Phishing works by sending emails laced with ransomware, fileless malware, and other threats directly to your employees. These emails are disguised as messages from trusted individuals like a manager, coworker, or business associate to trick your employees into activating the enclosed malware or granting unauthorized access. The results include Business Email Compromise (BEC), Account Takeover (ATO), credential theft, ransomware and more disastrous incidents. As these attacks grow more sophisticated, not even Google Workspace or Microsoft 365 can filter them out, but we can!

Our solution requires no hardware purchase or software downloads; it’s ready to deploy in minutes to start protecting your business by:

Analyzing your employees’ business relationships (who they work with, how often they communicate, etc.) to make trusted profiles.

Scanning for suspicious irregularities in message content and attachments and comparing them to trusted profiles to detect attacks.

Learning from user interaction and feedback to grow smarter and defend you better from new, emerging threats.

Advanced AI Email Security

Automatically protect against phishing, adjust to new threats and prevent attacks from reaching your users. Our AI technology helps you detect and respond to advanced threats before they do any damage.

Email Warning Banner

Help users spot suspicious messages with our interactive EmployeeShield email banner. Our system explains why a message may be a threat and gives users the ability to report phishing or mark it as safe in one click.

Automatic Alerts & Quarantine

Automatically quarantine suspicious emails to maximize your security without additional IT workload. Receive instant alerts when attacks are quarantined.

Conclusion:  As phishing remains one of the most common and damaging cyber threats, investing in an anti-phishing solution is a proactive measure that can save your organization from significant financial and reputational harm.

Don’t leave your business vulnerable.

Diversions is your business technology provider.