ServicesCybersecurity
Cybersecurity

Security that's actually on.

Most small businesses have antivirus installed and MFA disabled. We fix that. CIS-hardened endpoints, a 24/7 managed SOC, and attack surface reduction rules applied to every device we touch.

What's included

A security stack built for small business — not enterprise theater.

Two tiers, both real. Endpoint Hardened ships on every Windows endpoint we manage — pushed and verified by our RMM. Cloud Hardened ships on top, for clients whose Microsoft 365 we provision through our Pax8 channel.

Tier 1

Endpoint Hardened — every client we manage

Microsoft Defender — CIS hardened

We apply the CIS Benchmark Level 1 baseline to every Windows endpoint: real-time protection, ASR rules, cloud-delivered protection, and network protection enabled.

Huntress 24/7 managed SOC

Huntress hunts for persistent footholds, hackers living in your environment, and ransomware precursors — then remediates automatically or escalates to you.

Attack surface reduction (ASR) rules

Blocks Office macros from spawning processes, credential theft from LSASS, obfuscated scripts, and 14 other common attack vectors — all native to Windows Defender.

Privileged access controls

No one runs as local admin on managed workstations. Windows LAPS rotates a unique local admin password per machine, escrowed in our RMM. Separate admin accounts for IT tasks, never used for email or browsing.

BitLocker full-disk encryption

All managed workstations and laptops encrypted at rest. Keys escrowed in our RMM — recoverable in minutes if needed, unreachable to thieves.

Security awareness baseline

We run phishing simulations and provide training links through Huntress Managed SAT. No separate vendor, no per-seat add-on — included in our security tier.

Tier 2

Cloud Hardened — M365 clients (Pax8 channel)

Requires M365 we provision
MFA enforcement

Microsoft Entra ID Conditional Access policies enforce MFA on every login, block legacy authentication (POP/IMAP/SMTP/EWS basic auth), and restrict sign-ins to named US locations by default.

Email security

SPF, DKIM, and DMARC enforced (DMARC p=reject). Microsoft Defender for Office 365 Safe Links and Safe Attachments on every mailbox, with aggregate-report monitoring.

Why it matters

The average ransomware claim for an SMB under $25M revenue is $84,000. The average prevention cost is $25/endpoint/month.

Source: Coalition, 2025 Cyber Claims Report (May 2025) · see full citations on /small-business.

Most small businesses get breached because of three things: no MFA, no EDR, and admin accounts used for daily work. Our baseline fixes all three on day one of onboarding.

Huntress specifically finds attackers already inside your network — not just malware at the door. That's the gap where small businesses get hurt and traditional AV fails.

Running a 1–10 device shop? Huntress EDR + 24/7 SOC ships included on Business Shield and Business Fortress.

Schedule a security review
94%

of ransomware is delivered via phishing or unpatched systems — both addressed in our baseline.

Tier 1 stack — every client we manage
Microsoft Defender Defender ASR (16 rules) Defender for Endpoint Tamper Protection Huntress EDR/SOC Huntress Managed SAT TacticalRMM Action1 Patch Management Windows LAPS BitLocker Cloudflare Gateway (DNS)
Tier 2 stack — M365 clients (Pax8)
Microsoft Entra ID Conditional Access Defender for Office 365 SPF / DKIM / DMARC Pax8 CIPP
Inside the Security Operations Center

What managed EDR actually looks like.

Most MSPs say they have a 24/7 SOC. We can show you the actual product. Below: the Huntress Command Center your account lives in, plus the ITDR view that watches your Microsoft 365 identities for stolen credentials and rogue app installs. As an Authorized Huntress Partner, we deploy and manage these on every plan that ships with 24/7 SOC — Shield and Fortress on our small-business tiers, plus Co-Managed, Managed Pro, and Enterprise on our per-user plans.

Huntress Command Center dashboard
Command Center — every endpoint, every detection, every analyst response, in one view. Your reports are pulled directly from this.
Huntress ITDR identity view
Managed ITDR — your Microsoft 365 identities watched 24/7 for stolen credentials, rogue OAuth grants, suspicious sign-ins, and inbox forwarding rules.
Huntress Authorized Partner
Frequently asked

Common questions about cybersecurity.

Plain answers to the questions cyber-insurance carriers and IT auditors are asking you.

What's the difference between Endpoint Hardened and Cloud Hardened?

Endpoint Hardened is everything we push to your Windows machines directly: Microsoft Defender at CIS Benchmark Level 1, 16 Attack Surface Reduction (ASR) rules, BitLocker full-disk encryption with keys escrowed in our RMM, Windows LAPS with rotating local-admin passwords, and no standing local admin. It works on any Windows endpoint, with or without Microsoft 365. Cloud Hardened adds the identity-layer controls — Conditional Access MFA, blocked legacy auth, geo-fenced sign-ins, Defender for Office 365, and DMARC enforcement at p=reject. Cloud Hardened only exists on tenants we provision through our Pax8 channel, because those controls have to live where the identity lives.

What is Huntress and why is it in your stack?

Huntress is a Managed EDR (Endpoint Detection and Response) and ITDR (Identity Threat Detection and Response) platform with a 24/7 human Security Operations Center watching the alerts. Antivirus catches known-bad files. EDR catches the behavior — process injection, persistence mechanisms, ransomware staging — that comes before the payload runs. We're an Authorized Huntress MSP Partner, and Huntress is bundled into every per-user plan from Co-Managed up, and into the Business Shield and Business Fortress flat-rate plans on the Small Business track.

Isn't Microsoft Defender good enough on its own?

Defender out of the box is fine. Defender configured correctly is a serious enterprise-grade product. We harden it to CIS Benchmark Level 1, layer on the 16 ASR rules Microsoft documents but most shops never enable, turn on Tamper Protection, and enroll it in cloud-delivered protection — then add Huntress on top because Defender's own blind spots (identity-layer attacks, living-off-the-land binaries, attacker dwell time) are exactly what a 24/7 SOC is for. The full breakdown is in our blog post "Defender Is Free. Configuring It Correctly Is the Work."

We're a small shop with only a few devices. Do we still get the full security stack?

Yes — the security tier you get is set by which plan you're on, not which page you arrived from. On the per-user track (5+ users), Endpoint Hardened plus Huntress 24/7 SOC is included from Co-Managed ($99/user/month) up. On the flat-rate Small Business track for 1–10 device shops, the security baseline is on every tier; Huntress is added on Business Shield ($199/month, up to 7 devices) and Business Fortress ($349/month, up to 10). The Business Watch tier ($99/month, up to 3) is baseline-only — no Huntress.

Can you help us pass a cyber-insurance audit or renewal?

Yes. The questions on a 2026 cyber-insurance application — MFA on email, EDR on endpoints, immutable backup, written incident response plan, security awareness training, no standing local admin, patching cadence — map almost one-to-one onto what's already in our stack. We provide written attestation of every control, the evidence to back it, and a quarterly compliance report. For many businesses this is the deciding factor — a cheaper provider that can't sign off on the controls leaves the business holding the renewal on its own.

What happens if we actually get hit — do you handle incident response?

Yes. The first response is automated: Huntress isolates the endpoint at the network layer and rolls back what it can. From there a real engineer takes over — containment, scope assessment, restoration from immutable backup, root-cause analysis, and the written report you'll need for insurance and legal. Business Fortress includes a 2-hour incident response retainer and a written IR plan. For per-user clients, IR is covered under your monthly fee for in-scope environments.

Not sure where you stand?

Free security posture review. We'll tell you what's exposed, what's covered, and what we'd do — in writing, no commitment.

Get the free review