We got you covered

Cyber-attacks have become a constant and imminent business risk. Small and medium size businesses are more vulnerable than ever before, as these businesses are lacking the required cyber security sophistication that could protect and save them from going out of business.

010 is your Technology and Cyber Security business partner.

Empowering Technology Business Partners across Canada 🍁 

We are here 24/7/365

We provide a collection of managed services based on strict SLAs.

Monthly subscription, no commitment

Our solutions and services are easily deployed and available immediately.

Augment your services and tailor them to your client’s needs.

Always prepared, Always evolving

Cyber threats are always evolving, and so are we.

We proactively identify emerging threats and maintain a state of preparedness prior to their potential impact.

Our experience, Your security

25+ years of cloud computing and cyber security experience.

Thousands of satisfied clients.

Tens of thousands of annual support calls resolved.

A perfect integration of knowledge, effectiveness and dedicated support

010 believes that cyber defense should not be expensive or overly complicated, which is why we created a comprehensive cyber defense platform to strategically tackle the threats of the modern world.

010 specializes in the most advanced cyber security solutions and provides our clients with peace of mind through highly sophisticated managed services deployed globally.

010 excels in tailoring solutions to precisely match the unique needs of your clients.

010 methodically expands the value of your corporate services to realize untapped revenue streams.

We got you covered


Cyber Risk Assessment

The basis for building a defense umbrella for an organization is to perform an examination of weak points, identify loopholes, define needs, and make recommendations to fill gaps between the existing protection and the desired protection.

Information security is required to maintain information confidentiality, information availability and integrity.

010 works according to the methodology of the Israeli Cyber ​​Headquarters with adjustments required for each organization according to its size, nature, geographic distribution, regulatory requirements, relevant threats, and exposures.

The content of the assessment varies depending on the client and his infrastructure and usually includes:

  • Interviews with key people in the organization
  • Database mapping
  • Mapping infrastructure and information systems
  • Mapping processes in the organization
  • Network and systems scanning to identify network weaknesses.
  • Checking the way information systems are used, remote access passwords and more.

At the end of the survey, an executive report describing the current situation and the gap to the desired situation will be produced.

The report will detail the findings and the level of risk for each finding, as well as recommendations for correcting the deficiencies.

The report will be a guideline for the organization to perform necessary actions and repairs to minimize the damages in the event of an attack.

Security Awareness Training

If you lock your house and set an alarm but do not teach your children not to open the door to strangers, the investment in the door and the alarm will be useless because the child will open the door to a thief.

The same with technological defenses against cyber-attacks.

 no matter what defense technologies you put in place - you must make sure that your employees do not accidentally allow the cyber criminals into the organization.

To significantly reduce the risk of a cyber incident, the first and basic thing is to carry out regular training for employees in the organization and teach them to recognize the potential for a cyber incident and teach them how to avoid it.

Information security awareness is an educational process that teaches employees about network security, best practices and even compliance with standards and regulations.

 A comprehensive security awareness program trains employees in a variety of information technology, security, and other business topics.

These include, among others, ways to identify impersonation and other types of attacks such as social engineering, detecting behaviors of potential malware, reporting possible security threats, monitoring the company's IT policy and best practices, as well as complying with all privacy regulations.

The proposed employee awareness service is based on short training videos on various topics of cyber, privacy protection and the laws to prevent sexual harassment.

Security Updates

No software or operating system in the world is perfect, and from time to time security holes are discovered in the operating systems or software you use. 

When such a loophole is discovered, the manufacturer issues a security patch for the loophole. In the notice about the patch, he also explains what the loophole is and how this patch solves the problem.

The problem is that as soon as a security update is released, the cybercriminals (hackers) know how to attack and specifically harm people who have not installed this security update.

Therefore, as part of our services, we recommend installing a solution that ensures that your computer is immediately updated with every security update, whether the update is for the operating system or whether it is for third-party software that you use.


E-mail Filtering

One of the main ways through which a cyber-attack starts is through email.

According to the FBI, the total losses of companies worldwide during the last three years just as a result of email hacks and impersonation attacks, is estimated at more than 28 Billion dollars.

Adding the email filtering solution provides immediate protection to customers against cyber-attacks carried out through email, some of which are very easy to carry out and very difficult to detect and neutralize.

Examples of email attacks:

  • Phishing and Spear Phishing
  • Email Account Takeover (ATO)
  • Email Account Hacking (BEC)
  • Identity Theft and Spoofing
  • Ransomware

An example of "CEO fraud" is a situation where an impersonating email is sent from the CEO to the CFO with instructions to transfer money to the attacker's bank account.

The email filtering service uses advanced AI/ML technologies to identify these emails and prevent them from reaching users in the organization.

In addition, a team of experts monitors the suspected emails and makes sure that mail marked as malicious email is indeed malicious (this reduces the burden on your helpdesk in dealing with False Positive).

SIEM/SOC as a Service

As you know, cybercriminals do not only work according to the working hours in organizations and many attacks take place at night and on weekends.

On the other hand, as soon as the response team begins to deal with an incident close to its occurrence, the damage can be minimized and reduced.

Therefore, constant monitoring (SIEM) of the systems to identify unusual events in real time,  combined with an intervention team (SOC service) that responds immediately to each event are critical to preventing/reducing cyber damage to the organization.

The monitoring system (SIEM) Perch of Connectwise that we represent is one of the leaders in the field and contains the tests required to detect anomalies in real time.

Our cyber incident response team operates 24/7/365 from the USA and contains intervention teams at all levels for all types of cyber incidents. 

The team knows how to alert and handle all types of cyber incidents.

Cyber Intelligence

Thousands of user details and PII are stolen every day, including addresses, passwords, dates of birth, social security numbers and other personal details that are offered for sale on the DarkNet to the highest bidder and allow the buyer to impersonate you, penetrate private and corporate computers and take control of the computer, the camera and even bank accounts.

In order to defend against this possibility, and as part of our range of services, we operate an intelligence system that combines advanced technology and a human team for our clients to check which of their information has been leaked to the Dark Web and provide them with tools and solutions to prevent and deal with corporate information leakage.

End user

Backup as a Service

Various events can cause you to need to restore historical information. 

These events are divided into two main types:

  1. Physical failure - for example: a disk that breaks down, a stolen/lost computer, etc.
  2. Logical failure – cyber-attack, deletion of information, unwanted change of files, human error etc.

In all of these cases, there is damage to your information, and you will have to restore it.

Sometimes the damage is discovered immediately (like a disk failure) and sometimes it takes many months until the fault is discovered (like when a file is deleted/changed).

Therefore our service allows you to recover the information even if months/years have passed until you have discovered that important information was lost.

010's backup service supports many and varied technological platforms, applications, databases, and devices easily and simply and guarantees your organization maximum readiness for any scenario of logical or physical failure, which may lead to data loss.

010's managed backup service benefits:

  • A team of experts who proactively check your backup status and prevent malfunctions.
  • Local backup + cloud backup to 2 remote sites
  • AES256 level encryption capability to prevent theft of your information.
  • Long retention – even 7 years or more
  • Ability to restore single items or even the entire system.

Active EDR – Protecting Against Ransomware

The most common cyber-attack is a ransomware attack. In this attack, the attackers encrypt the information on the business’s computers and demand payment for the release of the information. Such an event harms the victim in several aspects:
Shutdown of the company
Violation of the information privacy of employees and customers
Damage to the company’s reputation
Waste of time and money to recover.
To avoid attacks of this type, as part of the protection packages, we recommend installing SentinelOne Active EDR on the computers in the organization. SentinelOne detects a ransom event at the very beginning and stops the attack.
In addition, if some of the information was encrypted before the attack was stopped, SentinelOne can revert the system to its original state, so that you do not have to pay the ransom.

Fully Managed Firewall

Turn on Intrusion Detection and Intrusion Prevention features. Send the log files to a managed …

Skip to content