SNCW CYBER

We are a student-led cybersecurity team offering free security assessments to small businesses within Erie, PA and surrounding cities.

Get Your Free Assessment

Our Core Services

Comprehensive protection tailored for small business needs.

๐Ÿ”

Vulnerability Scanning

We identify critical weaknesses in your networks, devices, and software stacks using industry-standard tools before hackers can exploit them.

๐Ÿ”’

Policy & Security Review

We help businesses improve access control, password policies, and data handling. We analyze how your team handles data to prevent leaks.

๐ŸŽ“

Education & Reporting

We deliver a detailed, educational report of our findings with remediation recommendations. We teach you how to fix the problems we find.

Meet the Team

Gannon University Students & Co-Founders

Benjamin Williams

Co-Founder

Jacob Caruso

Co-Founder

Justin Novotney

Co-Founder

Lucas Schilling

Co-Founder

Clients and Reviews

See what our partners are saying about our work.

โ€œThe team did an excellent job at addressing our audit findings with clear action, documentation and follow through. We now have compliant cybersecurity measures in place. As a church/non-profit in todayโ€™s economy, we werenโ€™t in a position to pay for services nor did we even know our needs. We appreciate the teamโ€™s help, support and great work!โ€

St. Andrew the Apostle Parish

Cybersecurity Resources

Expert guidance and easy-to-use tools for modern business protection.

What is NIST CSF 2.0?

The NIST Cybersecurity Framework (CSF) 2.0 is the gold standard for managing and reducing cybersecurity risk. Released by the National Institute of Standards and Technology, it provides a "common language" for businesses of all sizes to understand and improve their security posture. CSF 2.0 emphasizes Governance and is designed to be flexible, helping even the smallest businesses build a defense that works for them without breaking the bank.

Small Business Security Roadmap

โš–๏ธ

1. Govern

Establish security rules and responsibility.

Action: Use the NIST SMB Quick-Start Guide to create a simple "Acceptable Use Policy."

๐Ÿ“‹

2. Identify

Inventory your hardware, software, and data.

Action: Use a free tool like AssetTiger to track every laptop and sensitive file your business owns.

๐Ÿ›ก๏ธ

3. Protect

Use safeguards like strong passwords and MFA.

Action: Turn on Multi-Factor Authentication (MFA) for your email. It's built-in, free, and stops 99% of attacks.

๐Ÿšจ

4. Detect

Monitor for "weird" activity or logins.

Action: Use Have I Been Pwned domain search to get alerts if employee passwords are leaked online.

๐Ÿ“ž

5. Respond

Have a plan for when something goes wrong.

Action: Print a physical "Crisis Contact Sheet" with phone numbers for your bank, insurance, and IT help.

โ™ป๏ธ

6. Recover

Ensure you can get back to work after a crash.

Action: Use Cloud Sync (OneDrive/Google Drive). Saving to the cloud ensures files are safe even if a PC fails.

Cybersecurity Toolbelt

Bitwarden

Password Manager: A secure digital vault for all your business passwords. Stop using sticky notes.

Get Bitwarden →

Authenticator Apps

MFA / 2FA: Adds a "second lock" to your accounts. Hackers can't login without your phone.

Get Authenticator →

Malwarebytes

Scanner: If your computer is acting slow, this scans every corner to find hidden viruses.

Get Scanner →

Check Phish

Link Analyzer: Not sure about a link? AI "looks" at the page safely to tell if it's a scam.

Check Link →

Quad9 DNS

Filter: Works in the background to block "bad" websites from loading on your network.

Setup Quad9 →

Cloudflare

Web Protection: A protective bubble for your site that stops DDoS attacks and speeds up loading.

Get Cloudflare →

Phishing Awareness Training

Phishing is where criminals impersonate trusted entities (vendors, banks) to manipulate employees. 60% of small businesses that experience a cyber-attack go out of business within 6 months.

1. Psychological Tactics
  • Urgency: "Act Now or Lose Access" โ€” Designed to induce panic.
  • Authority: "This is the CEO" โ€” Exploits desire to please leadership.
  • Curiosity: "Check out this photo" โ€” Baits clicking on malware.
2. Red Flag: The "From" Address
Valid Sender (Safe) Suspicious Sender (Phishing)
billing@amazon.com amazon-support@gmail.com
hr@yourcompany.com hr-update-service@badsite.net
3. Best Practices for Safety
  • Macro Safety: Be cautious with "Enable Content" in Word/Excel files.
  • Credential Isolation: Keep work and personal email accounts strictly separate.
  • Gift Cards: Verify any requests for gift cards with a phone call. This is a common scam.
4. Standard Operating Procedures (SOP)
  • Verification First: Avoid opening attachments from unexpected sources.
  • Manual Navigation: Instead of clicking "Login" in an email, type the website address manually.
  • Out of Band Check: Call or text the sender if a request feels strange.

Frequently Asked Questions

Is this really free?

Yes. As students, our goal is to gain real-world experience. We provide professional-grade assessments at no cost to help our local Erie community.

Do you fix the problems you find?

We provide a "Remediation Plan" that explains exactly how to fix the issues. For complex IT work, we may refer you to a dedicated IT provider.

Will you need my passwords?

No. We never ask for your passwords. Our scans are performed from the "outside looking in" or using guest access you provide.

Contact Us

Ready to secure your business? Send us a message.

โ†‘