Enabling customers to find the best IT solutions for their business while providing quality customer service.
Natalie Shadeck Client Account Manager
Always at your service to provide the highest level of quality support to our customers.
Anthony Firth Client Engineer
We treat all of our clients like family, so expect nothing but the best.
Tony DiCarlo Systems Engineer
Driven by excellent IT solutions and outstanding customer support.
Anthony Monteverde Systems Engineer
“I’m passionate about building and fostering relationships, and finding solutions for success.”
Michael Koenig Client Account Manager
“Enabling IT to become an effective and valuable partner by delivering premier customer service and quality IT solutions achieving business goals.”
Jake Parrott Business Development Manager
“Serving the client through IT solutions is my passion. A happy client is a happy me.”
Jason RichardsonClient Engineer
“Striving to provide friendly and quality service to our customers”
Ted Rorabaugh Client Engineer
“I help clients stabilize and grow their IT infrastructure so they can focus on growing their core business.”
Josh Wilshire Systems Engineer Team Lead
“Helping to maintain daily office operations and provide the highest level of customer service is my goal”
AnNette Chavez Administrative Assistant
“Providing courteous, quality IT service for our customers.”
Rich Yoest Rapid Response Team Supervisor
“Striving to be your trusted adviser and IT teammate in accomplishing all your business goals”
Brandan Bishop Client Account Manager
“I strive to provide the highest level of quality service to our customers.”
Tommy Williams Sr. Hardware Engineer
“I’m driven by the steadfast belief that technology must serve as a business enabler. This mantra has driven 21
Years of successful partnerships.”
Stephen Riddick VP Sales & Marketing
“CSP doesn’t succeed unless your company succeeds.”
Stephen Allen Inventory Manager
“Through my intuition and genuine concern to help others I have built long-lasting relationships with our customers, co-workers and business partners.”
Scott Forbes VP Support Services
“Every day, I work with clients to help plan the future of their businesses.”
Michael Bowman vCIO
“Your IT problems become our IT solutions.”
Mark McLemore Project Engineer
“Managing internal and external operations to ensure that CSP provides quality and reliable customer service .”
Margie Figueroa Business Manager
“Helping customers get the most out of their IT Infrastructure.”
Marc Gillet Project Engineer
“Providing quality internal and externals financial support to our customers and accounting support to CSP.”
Katie Steiglitz Accounting Administrator
“Your satisfaction is our #1 priority.”
Heather Moore Project Manager
“Making technologies efficiently work to increase productivity.”
Darryl Richards Client Engineer
“Some call me the CEO. I call myself the Cheerleader for an awesome team!”
William B. Riddick Founder & CEO
“CSP is here to assist you with your IT needs.”
Beth Wylie Inside Sales Manager
Thinking ofHiring A New IT Company?
On What Questions You Need To Ask Before Signing Any Agreement.
You’re Probably Ignoring A Lot More Security Threats Than You Think!
A study by Gartner called “Security and Risk Management Scenario Planning, 2020” found that by the year 2020, 30% of all global 200 companies will have been directly impacted by independent cyber criminals or cyber activists. It’s not a totally surprising claim because most organizations focus on control gaps and vulnerabilities when performing their risk assessments while they neglect to take threats into account. This is due to the fact that threat strategies, competences, and actions are hard to determine.
At the 2014 RSA Conference, a major topic was threat management and intelligence. Not only were the topics covered in workshops and presentations, but a large number of vendors showcased their newest security threat technology. The goal was to assist security professionals in strengthening their existing security protocols with better visibility.
For a security incident to occur, there must be a vulnerability present in some form, such as:
A software flaw
Risky behavior online
Or any other type of vulnerability
Then a threat must discover and exploit that vulnerability. Typically, security professionals have no control over the threats that affect their business, which has in the past led to neglecting threats as part of risk assessment. Instead the focus is put on more visible facts like vulnerabilities and control failures. But the amount of vulnerabilities facing businesses today has expanded at staggering rates – it’s nearly impossible to deal with all of them without trying to determine the likelihood that they will be exploited.
By 2020, Gartner predicts that 25% of global enterprises will engage in services of a “cyberwar mercenary” organization, including threat intelligence services. Subscribing to these services is cost-prohibitive for many businesses because subscriptions run up to hundreds of thousands of dollars each year. Plus, threat intelligence is not yet a mature market with inherent weaknesses such as the lack of measurement parameters (like reliability of information and risk assessment).
Threat intelligence services add to the volume, velocity, and complexity of data feeds that need to be analyzed and prioritized. They require experts who can go through huge volumes of information to correlate threat intelligence, vulnerability data, and other files.
Luckily, new technology is always emerging, and with big data risk management it will be easier not only to combine different threat intelligence feeds, but also associate security data with its business criticality or risk level to the organization.
For more information on risk analysis and the threats facing your business today, contact CSP, Inc.
Send us an email at email@example.com or reach out by phone at (919) 424--2000.