Frequently Asked Questions (FAQ)

Your Guide to Understanding Pillar Security’s Services

Welcome to our FAQ page! Here, you’ll find answers to the most common questions about our services and how we can help secure your business. If you don’t see your question here, feel free to reach out to us directly.

General Information

Learn More About Pillar Security and Our Services

What is Pillar Security?

Pillar Security is a cybersecurity firm dedicated to protecting small businesses from cyber threats. Our services focus on comprehensive risk assessments that identify vulnerabilities and provide actionable recommendations to enhance your security posture.

What services do you offer?

We specialize in cybersecurity risk assessments, which include network scanning, vulnerability detection, and detailed reporting. Additionally, our services encompass data sensitivity analysis, secure baseline establishment, risk mitigation planning, and compliance tracking. Our goal is to help small businesses understand their security weaknesses and implement effective solutions to mitigate risks.

What industries do you serve?

We serve a wide range of industries including finance, healthcare, retail, and technology. Our tailored cybersecurity solutions are designed to meet the specific needs of each sector, ensuring comprehensive protection against cyber threats.

How do I contact Pillar Security for more information?

You can reach us via our contact page or at contact@pillarsecurity.io. We are always available to answer your questions and provide more information about our services. Visit our contact page for details.

Service Details

In-Depth Information About Our Cybersecurity Risk Assessments

What is a cybersecurity risk assessment?

A cybersecurity risk assessment is a comprehensive evaluation of your IT environment to identify potential vulnerabilities and threats. It includes examining your network, devices, and systems to provide a detailed report on your security posture and recommendations for improvement. Our assessments also include data sensitivity analysis and secure baseline establishment.

What is my Security Portal?

All Pillar clients receive lifetime access to their own Small Business Security Portal. This is where all communication, documentation, and reporting will take place with Pillar, where you can access your cybersecurity learning courses, and access the exclusive cybersecurity community for small business owners. There are many other features coming soon that are best experienced by completing a Risk Assessment. 

How does the risk assessment process work?

Our risk assessment process begins with an initial consultation to understand your business needs. We then conduct a thorough scan of your IT infrastructure, analyze the data, and compile a report with findings and actionable recommendations. The final step is a review meeting to discuss the results and next steps, ensuring you have a clear roadmap to enhance your security posture.

What do the different user, device, and network counts mean in your pricing?

Our pricing is based on the scale of your business.

Users: Employees within scope. IT Teams, only include the size of your team and not your organization.

Devices: How many endpoints and servers you would like included in the assessment. Network scans included in the assessment may discover and include vulnerabilities on other devices, but are not guaranteed unless discussed otherwise with your Security Expert.

Networks: This determines the scope of our scanning and recommendations. Many remote teams choose to assess their home network or a shared office space.

The user count refers to the number of employees, the device count includes all connected devices, and the network count pertains to the number of distinct network setups we will assess. This structure ensures that you only pay for what you need.

How long does a risk assessment take?

Your risk assessment will be available in your Security Portal within two business days of your submitting the required information.

How will I receive my assessment results?

You will receive a detailed report, uploaded into your Security Portal, free for life for all Pillar Clients. The report includes an overview of your security posture, identified vulnerabilities, and recommendations for remediation. We can also schedule a follow-up call to discuss the findings in detail.

What happens after the assessment is complete?

After the assessment, we provide you with a roadmap for addressing the identified risks. You can choose to implement the recommendations yourself or engage our services for further assistance. Our goal is to ensure that your business is well-protected against cyber threats.

How do you handle ongoing compliance and risk monitoring?

We offer continuous monitoring services that include regular compliance tracking, risk assessments, and updates to ensure your business remains secure and compliant with industry standards.

Technical and Pricing Questions

Understanding Our Services and Their Costs

How are your services priced?

Our services are priced based on the number of users, devices, and networks. We offer competitive packages for solopreneurs, small teams, and growing businesses. This tiered pricing ensures that you receive the most value for your specific needs.

Are there any additional fees?

There are no hidden fees. All costs are included in the package price, which covers the risk assessment, detailed reporting, and recommendations for improvement.

What is included in each package?

Each package includes a comprehensive risk assessment, a detailed report of findings, and actionable recommendations. You also receive lifetime access to your Security Portal and its included resources, such as the free email security and anti-spoofing course. The specifics of your delivery may vary depending on the size and complexity of your business, ensuring you get a tailored solution.

What types of devices do you support?

We support Windows, Mac, and Linux operating systems. Many of our network-capable scans may discover and report on other connected assets, but your endpoint count is restricted to those three operating systems.

How do you handle data security and privacy?

We adhere to strict data security protocols and privacy policies to ensure your information is protected at all times. Our processes comply with industry standards and best practices, giving you peace of mind that your data is secure.

Subscribe To Our Cybersecurity Newsletter

The Security Column