We are a student-led cybersecurity team offering free security assessments to small businesses within Erie, PA and surrounding cities.
Comprehensive protection tailored for small business needs.
We identify critical weaknesses in your networks, devices, and software stacks using industry-standard tools before hackers can exploit them.
We help businesses improve access control, password policies, and data handling. We analyze how your team handles data to prevent leaks.
We deliver a detailed, educational report of our findings with remediation recommendations. We teach you how to fix the problems we find.
Gannon University Students & Co-Founders
Co-Founder
Co-Founder
Co-Founder
Co-Founder
See what our partners are saying about our work.
โThe team did an excellent job at addressing our audit findings with clear action, documentation and follow through. We now have compliant cybersecurity measures in place. As a church/non-profit in todayโs economy, we werenโt in a position to pay for services nor did we even know our needs. We appreciate the teamโs help, support and great work!โ
Expert guidance and easy-to-use tools for modern business protection.
The NIST Cybersecurity Framework (CSF) 2.0 is the gold standard for managing and reducing cybersecurity risk. Released by the National Institute of Standards and Technology, it provides a "common language" for businesses of all sizes to understand and improve their security posture. CSF 2.0 emphasizes Governance and is designed to be flexible, helping even the smallest businesses build a defense that works for them without breaking the bank.
Establish security rules and responsibility.
Action: Use the NIST SMB Quick-Start Guide to create a simple "Acceptable Use Policy."
Inventory your hardware, software, and data.
Action: Use a free tool like AssetTiger to track every laptop and sensitive file your business owns.
Use safeguards like strong passwords and MFA.
Action: Turn on Multi-Factor Authentication (MFA) for your email. It's built-in, free, and stops 99% of attacks.
Monitor for "weird" activity or logins.
Action: Use Have I Been Pwned domain search to get alerts if employee passwords are leaked online.
Have a plan for when something goes wrong.
Action: Print a physical "Crisis Contact Sheet" with phone numbers for your bank, insurance, and IT help.
Ensure you can get back to work after a crash.
Action: Use Cloud Sync (OneDrive/Google Drive). Saving to the cloud ensures files are safe even if a PC fails.
Password Manager: A secure digital vault for all your business passwords. Stop using sticky notes.
Get Bitwarden →MFA / 2FA: Adds a "second lock" to your accounts. Hackers can't login without your phone.
Get Authenticator →Scanner: If your computer is acting slow, this scans every corner to find hidden viruses.
Get Scanner →Link Analyzer: Not sure about a link? AI "looks" at the page safely to tell if it's a scam.
Check Link →Filter: Works in the background to block "bad" websites from loading on your network.
Setup Quad9 →Web Protection: A protective bubble for your site that stops DDoS attacks and speeds up loading.
Get Cloudflare →Phishing is where criminals impersonate trusted entities (vendors, banks) to manipulate employees. 60% of small businesses that experience a cyber-attack go out of business within 6 months.
| Valid Sender (Safe) | Suspicious Sender (Phishing) |
|---|---|
| billing@amazon.com | amazon-support@gmail.com |
| hr@yourcompany.com | hr-update-service@badsite.net |
Yes. As students, our goal is to gain real-world experience. We provide professional-grade assessments at no cost to help our local Erie community.
We provide a "Remediation Plan" that explains exactly how to fix the issues. For complex IT work, we may refer you to a dedicated IT provider.
No. We never ask for your passwords. Our scans are performed from the "outside looking in" or using guest access you provide.
Ready to secure your business? Send us a message.