ABOUTUS

Tri-City Technology is an Information Technology Security Support and Consulting Firm. We are privately owned and provide a customized variety of solutions, specializing in proactive adversarial simulations.

Questions to ask of your company:

Does our Outsourced IT Company or IT Department provide regular offensive auditing per regulations of our sector/industry? 

What threats are currently targeting our company? 

How is our data managed?

Who has access, whether physically or remotely to any of our data? How much access do they have? Do we have a system in place that says "Person X viewed Document Y and 3 AM?"

Does our company have a single client residing in the EU?

What is our current policy if ransomware were to be unleashed on our network?

Who do I contact in the event of an IT Disaster? (Not the people who left that friendly (and only) note for you on your desktop)

Based on the type of company we are, what terrorist organizations or nation-state hackers are targeting us? (This is what a regular Red Team Audit should focus on). All too often, we see banks having IT Security Tests performed that should be for a manufacturing firm. This simply makes no logical sense in how hackers actually think and act. Regularly, companies are overcharged and uneducated on their actual protection. 

**Free tip: If a company runs a vulnerability scan on your systems and calls it a penetration test, fire them immediately**

I accidentally clicked that link, clicked enable content, and okay (I JUST WANTED TO SEE MY FILES).. now my computer is telling me all my files are locked and I only have three days to get Monero or Bitcoin to some strange address to a Terrorist organization...but they are acting strangely friendly??

 

1) What just happened?

 

2) Is this legitimate?

 

3) Who do I contact

4)What do I do now? (Do NOT pay it, it is a federal crime.)

A quick test to see if your company has overlooked misconfigurations (if you are not an admin): If you are on a Windows computer, press the Windows key, type "File Explorer" and press enter, go to C:\Users\. Within this folder are you able to view other users' documents on their desktops, scans folders, or non-password-protected passwords.txt file on their desktops? If so, please give us a call immediately. 

When you got promoted recently, did your department change? If so, are you still able to access things only your old department should have access to? 

 

All services offered are unique, customized, and handcrafted for your company. Our main strategies and procedures are centered around giving our clients a tailored form of their threat landscape. We focus on the modern-day world of threats to critical company assets and processes.

When you've got questions, audits, checkboxes, and want to respect your clients' data through doing thorough and up-to-date manual testing, please give us a call. We are here for you.

TESTIMONIALS

“Tri-City Tech was prompt, very knowledgeable and the rate was affordable. Tri-City Tech was able to recover our crucial business data. I would definitely recommend these guys! ”

George Harris
Wells Fargo Advisors

“Had a great experience...very professional, knowledgeable, and genuine...communication throughout the process was excellent...exceeded my expectations.”

Allison Mallory

"My computer fell prey to an ugly virus...This turned out to be much bigger than any of us expected. [REDACTED] did a great job of ridding my network of its illness, plus going above and beyond to clean up some lurking malware and spyware”

Lois Baldwin

TESTIMONIALS

“Tri-City Tech was prompt, very knowledgeable and the rate was affordable. Tri-City Tech was able to recover our crucial business data. I would definitely recommend these guys! ”

George Harris
Wells Fargo Advisors

“Had a great experience...very professional, knowledgeable, and genuine...communication throughout the process was excellent...exceeded my expectations.”

Allison Mallory

"My computer fell prey to an ugly virus...This turned out to be much bigger than any of us expected. [REDACTED] did a great job of ridding my network of its illness, plus going above and beyond to clean up some lurking malware and spyware”

Lois Baldwin

"Please feel free to run the tests you need to run on our system"

HIGHLY RESPECTED [REDACTED] - NYSE CIO

"Thank you for stopping an active data breach, our IT guy missed it completely"

President of [REDACTED]

"Please walk us through, step by step, how you were able to get that amount of access [sic] (finding a simple misconfiguration) in less than 15 minutes"

IT Director of [REDACTED]

"Please walk us through, step by step, how you were able to get that amount of access [sic] (finding a simple misconfiguration) in less than 15 minutes"

HIGHLY respectable Internal Defensive Security Team of [REDACTED]

"Please feel free to run the tests you need to run on our system"

HIGHLY respectable Chief Technology officer of [REDACTED]