Rheap Data Advanced Security is a security program that is designed to assist schools in evaluating the cybersecurity infrastructure that protects their students from harm.

Schedule your basic cyber attack assessment today!

Sign up now! We only have 1 FREE assessment each week and slots fill up quick!

How does the assessment work?

  1. Sign up for a consultation.

  2. Answer a few questions during a 26 minute initial assessment.

  3. Rheap Data will perform multiple cybersecurity tests in the background, including penetration testing and vulnerability scanning.

  4. Show up to your follow-up meeting a week later and learn how you can protect yourself from your greatest risks!

Rheap Data Advanced Security is a cybersecurity service that is tailored specifically to your security needs as a school. We start with a comprehensive cyber attack assessment test to determine your current security level, based on vulnerabilities and implemented security controls. We then work with your current IT Provider or Staff (don’t worry if you don’t have one, we can fill that role for you!) to get you started on a path to Level 3 security.

At Rheap Data we categorize your security infrastructure into one of four levels, Level 0, Level 1, Level 2, or Level 3. Our goal is get your school to Level 3 security. Our process audits and reevaluates your security level every quarter to make sure you’re on the path to the highest security possible.

Learn more about our security levels here!

What is Rheap Data Advanced Security?

Tailored

At Rheap Data, we take a look at your school’s technology from top to bottom and determine your largest threats for Cybersecurity. We then prepare a plan to mitigate risk, secure vulnerabilities, and shore up your defenses.

Robust

We provide you with unique and proprietary Cybersecurity solutions that will maximize your experience. At Rheap Data, we ensure your student’s are protected in a cost effective and efficient manner.

Trusted

All your confidential and sensitive data is taken seriously at Rheap Data. We use the highest levels of redundancies for backups and the strongest methods for Cybersecurity. We make sure that your data is safe and protected.

Rheap Data Security Levels

Level 0 - Basic or No Security Controls

Little to no security controls, or massive vulnerabilities that render controls meaningless. Has IT Essentials in place, backups, anti-virus, patch scheduling, and a help desk, but IT resources are dedicated to keeping the ship afloat and are willing to take short-cuts to provide functional systems. Security controls and procedures may be in place, but they are sporadic, arbitrarily enforced, or rendered meaningless by workarounds.

Level 1 - Advanced Security Controls

Security controls are implemented, enforced, and security procedures regularly audit controls to ensure effectiveness. Vulnerabilities are tracked, recognized, and are actively mitigated or are on the path to mitigation. Controls prevent attackers from moving between systems in the event of a breach. Backups are regularly tested, and verification is reported. Overall access philosophy has been successfully changed from ‘trust-but-verify’ to ‘verify then trust and verify again’.

Level 2 - Training, Response, and Intelligence

Security procedures to actively find and test vulnerabilities are implemented. Log analysis tools aggregate and alert security staff of active or potential threats. Security staff actively trains users, tests users, and then retrains users. New users are rigorously trained in security procedures and controls. Breach response protocols are implemented.

Level 3 - Audited Protection

Regular security meetings are held with executive staff to communicate organization security needs as threats and risk change over time. Rigorous third-party testing is performed to test security teams’ response times, threat detection, and attack mitigation. Testing is performed every 90 days to ensure security team is always prepared and able to mitigate real threats. Results of security audits are reported to executive level staff, and they are kept aware of the organization’s security posture.