Bundled Services

Our offerings include three distinct tiers: Essential, Enhanced, and Elite. Each tier provides your organization with increasing levels of support and cybersecurity. Every bundle can be enhanced with optional services to fortify and secure your operations. Scalable managed IT services from CBIZ provide the support and security you need that grow with your business.

Essentials

The Essentials bundle offers standard security, monitoring, management, and support.

Enhanced

The Enhanced bundle adds advanced cybersecurity threat detection.

Elite

The Elite bundle delivers more robust and cutting-edge cybersecurity defenses.

Management Services
  Essential Enhanced Elite
Quarterly Business Reviews
Strategic Planning and Consultation
Server Backup Management
MS 365 Business Premium Productivity Suite Management and Support
Vendor Management
Hardware/Software Procurement
DNS and Certificate Management
Documentation updates on an ongoing basis
End User Support
  Essential Enhanced Elite
Remote Management and Support (M-F, 8AM-6PM)
Remote Access Support
Remote Patching and other security updates
Backup Management
Mobile Device Management (up to 3 per user)
Cybersecurity
  Essential Enhanced Elite
Managed Endpoint Detection & Response (EDR)
Web Content Filtering
SPAM Filtering / Security Management
Multi-factor Authentication Support
Single Sign On (SSO) Management and Support
Dark Web Monitoring
Security Awareness Training & Phishing Simulation
Managed Security Information & Event Management (SIEM)  
Vulnerability Scanning   Quarterly Monthly
Managed Extended Detection & Response (MXDR)    
Cloud Configuration Assessment    

Optional Services

(Available for all Packages)

  • 24/7/365 Help Desk
  • Infrastructure Monitoring and Management
  • Cyber Resiliency Assessment
  • Attack Surface Mapping (ASM)
  • Threat Modeling
  • Managed Cybersecurity Governance Program (MGRC)
  • Security Posture Assessment (SPA)
  • Social Engineering Assessment
  • Wifi Security Assessment
  • External Penetration Testing
  • Internal Penetration Testing
  • Application Penetration Testing
  • Managed Print Services
  • Outsourced Information Security Advisor
services-advisory-risk-management-compliance-hitrust-assesment-tab

Included Services

Management Services

A review geared towards identifying areas for improvement and recommendations for future IT/Security enhancements so we can help you build an impactful IT/Security roadmap going forward.

Monitor and maintain copies of data and applications with regular backups and provide a recovery plan to restore data efficiently when needed.

Stay current with the latest versions of Word, Excel, PowerPoint, and more. Receive cloud-based connection from anywhere with 1 TB of storage.

Increase efficiencies and streamline costs: we’ll minimize the chance of outages and act as your point of contact with your existing vendors.

A centralized, up-to-date snapshot of your environment to facilitate troubleshooting and future planning.

End User Support Services

Support for your team members via our simple and easy ticketing system.

Support for your VPN connections.

OS and security patching to ensure known vulnerabilities are patched. Proactive alerts addressed as they happen, 24/7/365.

Peace of mind: All your data, not just email, is safely backed up with more additional options for customization.

Extending the security and support for your team’s mobile devices to keep them productive from anywhere.

Cybersecurity Services

Value Add-On: Cybersecurity for each Tier above.

Value Add-On: Cybersecurity for each Tier above.

Value Add-On: Cybersecurity for each Tier above.

Value Add-On: Cybersecurity for each Tier above.

Value Add-On: Cybersecurity for each Tier above.

Value Add-On: Cybersecurity for each Tier above.

Value Add-On: Cybersecurity for each Tier above.

Value Add-On: Cybersecurity for each Tier above.

Value Add-On: Cybersecurity for each Tier above.

Value Add-On: Cybersecurity for each Tier above.

Value Add-On: Cybersecurity for each Tier above.

Value Add-On: Cybersecurity for each Tier above.

Optional Services

The 24/7/365 Help Desk service ensures that your business operates smoothly and efficiently around the clock. A dedicated team of IT professionals is always available for immediate support to resolve technical issues, and prevent downtime. This provides continuous monitoring and proactive maintenance, ensuring that your IT infrastructure remains secure, stable, and optimized.

Infrastructure Monitoring and Management services provide comprehensive oversight and maintenance of your IT infrastructure, ensuring the stability, security, and efficiency of your network, servers, and systems. These services include 24/7 monitoring to detect and address issues promptly, proactive maintenance with regular updates and preventative measures to avoid downtime and performance issues, and robust security management to protect against cyber threats and vulnerabilities. Additionally, the service offers performance optimization, fine-tuning system performance for optimal operation and efficiency, and detailed reporting to keep you informed of your infrastructure’s health and performance.

The cyber resiliency assessment gauges an organization’s ability to effectively mitigate cybersecurity risk related to potential disruption caused by a cyber-attack. The assessment will reference the Center for International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27001, National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) v1.1 and NIST Special Publication (SP) 800-53 rev5. This assessment will be based on a Capability Maturity Model Integration (CMMI) approach and will describe the maturity of people, processes, and technology currently in place to support the ability of the organization to effectively respond and recover in the event of a cyber incident.

  • Define the target level of maturity for the organization.
  • Provide a comparison of the current state of cyber resiliency and incident response at the organization with peer groups based on industry, size, location, and other factors.
  • Capture observations and lessons learned during the assessment process.

This assessment will support the improvement of the cyber resiliency and incident capabilities of the organization to be better prepared for rapidly evolving cyber threats and attacks.

Attack surface mapping is a proactive measure in cybersecurity, allowing organizations to anticipate and mitigate potential attacks before they occur, rather than reacting to incidents after the fact. It is a fundamental step in the process of establishing a strong security posture. Attack surface mapping identifies, documents, and analyzes the various points where an unauthorized user could potentially enter or extract data from an organizations IT environment. The process begins with a comprehensive inventory of all systems, software, and services that are part of the organization’s network, including both public-facing and internal assets. The CBIZ team will then use state-of-the-art technologies to pinpoint potential vulnerabilities within those assets that could be exploited by an attacker. This includes weaknesses in software, misconfigurations, and unnecessary services or open ports. This process also provides visibility into which systems, networks, and/or applications are exposed to the public internet and to what extent, providing additional insight into which assets are most at risk.

The threat model or profile of an organization describes the information assets of the organization as well as the potential threat actors and their capabilities. The objective of a threat assessment is to inform the risk management process with regard to the tactics, techniques, and procedures (TTPs) that may be employed by a likely attacker. The threat assessment is a critical part of the overall risk assessment process which provides the basis for the implementation of controls to mitigate the specific cyber threats to the organization. The threat modeling process, relies on technical input from the Attack Surface Mapping process in conjunction with threat intelligence from a variety of sources.

Establishing an effective cybersecurity governance — including policies, standards, and procedures — is a foundational element in protecting an organization against cybersecurity threats. The program may be tailored to the specific needs of your organization but in all cases will include minimum baseline security controls to identify, protect, and monitor your environment, as well as the ability to respond and recover in the event of a cybersecurity incident. The CBIZ team utilizes the Compyl Security and Compliance automation Platform to support MGRC. Compyl is a secure, cloud-based platform supporting Governance, Risk and Compliance (GRC) processes. This allows CBIZ to effectively and efficiently provide MGRC services to clients of all sizes across all industry sectors.

The security posture assessment measures an organization’s ability to effectively mitigate cybersecurity risk. The assessment will reference the accepted industry frameworks for cybersecurity controls such as National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) v1.1, International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27001:2022 or the Center for Internet Security (CIS) Critical Security Controls (CSC) version 8, combined with scoring based on the Capability Maturity Model Integration (CMMI) process.

This assessment describes the maturity of people, processes, and technology currently in place to mitigate cybersecurity risk. The SPA report will define the target level of maturity for the organization based on risk profile; provide a comparison of the current state of cybersecurity at the organization with peer groups based on industry, size, location, and other factors; and provide actionable insights to improve cybersecurity risk management, governance, and control practices. This will support the improvement of the cyber risk mitigation capabilities of the organization to be better prepared for rapidly evolving cyber threats and attacks.

A social engineering assessment increases the awareness among employees about different types of social engineering attacks and the risks associated with them. The process will assess how employees react to social engineering attempts and whether they follow security protocols. This provides a measure of the effectiveness of existing security training programs and identifies areas for improvement to mitigate the risk of data breaches and other security incidents that can result from successful social engineering.

The results of the assessment identify potential vulnerabilities in human behavior and organizational processes that could be exploited by attackers. The final report will provide recommendations for improving security awareness training, revising policies, and enhancing security procedures.

A WiFi security assessment is a comprehensive evaluation of an organization’s wireless network infrastructure against potential security threats and vulnerabilities. The assessment will identify vulnerabilities in the wireless network, including weak encryption, poor access control, or outdated firmware that could be exploited by attackers. By identifying potential weaknesses, a WiFi security assessment can help prevent unauthorized access to the network, which could lead to data breaches or compromise of sensitive information.

External network penetration testing is a security exercise where ethical hackers simulate cyber-attacks on a company’s external-facing network infrastructure, such as web applications, email servers, and firewalls, to identify and address vulnerabilities. The objective is to identify exploitable weaknesses in systems and rank them based on their severity, which in turn provides guidance regarding effective remediation of these deficiencies. The process tests the effectiveness of the security measures in place, ensuring they can withstand an attack from outside the organization. External network penetration testing is a critical component of an organization’s overall cybersecurity strategy that provides assurance in the organization’s ability to defend against cyber-attacks.

Internal network penetration testing simulates cyber-attacks on an organization’s internal network to identify exploitable vulnerabilities. The process will identify weaknesses within the internal network that could be exploited by someone with network access, such as an employee or a hacker that has bypassed external defenses. The process also serves to validate the effectiveness of internal security controls and mechanisms, such as firewalls, intrusion detection systems, and access controls to prepare for scenarios where an attacker has gained access to the internal network, ensuring that systems are resilient to lateral movement and escalation of privileges. Internal network penetration testing is a critical element of an organization’s overall cybersecurity controls, providing technical insight into the operational effectiveness of defenses against both external and internal threats.

Application penetration testing evaluates the security of an application (web, mobile, or desktop) by simulating an attack. This process will identify security weaknesses within the application that could potentially be exploited, including issues with input validation, authentication mechanisms, session management, and more. The results of an application penetration test allow an organization to prioritize remediation efforts to mitigate potential risks to
the organization.

By discovering and patching vulnerabilities before attackers can exploit them, penetration testing helps to protect sensitive data from breaches. Regular penetration testing allows organizations to continuously improve their application security posture, adapting to new threats and evolving attack techniques. Application penetration testing is a critical component of a comprehensive cybersecurity strategy that provides actionable insights into an application’s security state.

Managed Print Services consists of the management of
copiers, printers, and multifunction devices under one
unified program. MPS helps identify ways to consolidate
print devices, while providing a print strategy and print policies that enhance print infrastructure for a
scalable future.

The MPS process includes replenishing print supplies
automatically, optimizing print security, and streamlining the printer fleet. As a result, MPS is known to help control costs and efficiencies to optimize these basic business functions.

Outsourced Information Security Advisor services involve partnering with an external expert to manage and update an organization’s IT compliance policies and risk assessments. This includes the development and annual revision of customized cybersecurity policies, assisting with updates or replacements of cybersecurity tools, and IT risk assessments. Additionally, the service provides recommendations for Business Continuity and Incident Response Plans, along with annual testing, and offers support for exam and audit preparation. Annual vulnerability scans are conducted remotely to identify potential security threats, ensuring the organization maintains robust and up-to-date information security practices.

Get Started

Dedicated support is available. Let us take the lead on optimization and cure tech headaches so you can focus on the core business, uninterrupted.

This field is for validation purposes and should be left unchanged.
Describe your relationship with us(Required)
What service are you inquiring about?(Required)
By requesting additional information, you will be added to our email list. You can unsubscribe from CBIZ emails at any time. For more details, please read our Privacy Policy.