Hi, I'm Mordy. I spent several years of my career building out a robust security program for one of the nations largest e-commerce platforms.
I had a sizable budget and a dedicated team at my disposal.
And that left me with a troubling question:
How can the average mid-size Enterprise stay secure and avoid a cyber attack without breaking the bank?
The process is overwhelming.
Security measures are ambiguous, cumbersome and not to mention costly.
But worst of all?
Often times, the holy-grail, time-vaunted cyber security methods don’t actually do anything to lower the risk.
They’re expensive tools that people chase after, while forgetting about security essentials.
That means burning through tens of thousands of dollars–while the doors stay wide open for cyberattackers.
It’s not glamorous. It’s not romantic.
It’s simple. And it works.
It starts with three fundamentals:
Your employees are the gatekeepers to your security. Do they know how to differentiate between fraud and genuine to keep your business safe?
ANALYZE YOUR RISKS
If you are running Server 2003 on your domain controller, I don’t need to run a 30k test to tell you you're vulnerable. I can tell you that – and where else you’re at risk – by inspecting and assessing your setup.
FORTIFY YOUR ENVIRONMENT
Seal the entry points before hackers find them. We’ll tell you what the best solution is to alleviate your risk, plus guide the implementation.
Our three Guarantees
DO THINGS THAT MAKE A DIFFERENCE
Not that look good, sound good, or make you feel good. Things that will actually strengthen your business and minimize the risk of cyberattacks.
SECURE FROM INSIDE-OUT
No slapdash, superficial solution. Every environment checked for risks. Every risk rated, reported, and resolved. In the right priority.
That’s how you stand up to hackers.
HERE WHENEVER YOU NEED US
Questions? Always welcomed. Need solutions? We’ll partner with your IT team to make it happen. Suggestions? Send them our way! We’re thrilled to hear how we can best work together.
Meet the troops
Meet Keystone’s chief. Mordy’s extensive background in cyber security began with him as a simple IT technician, removing viruses and setting up firewalls. Seeing a need in the industry, he eventually designed and taught a course to others looking to become technicians. He then led the cybersecurity team at B&H Photo, NYC. He’s a genuine, get-your-hands-dirty doer who moonlights as a frozen pizza connoisseur. He understands the complexities of cyber threats, and the limitations of standard solutions. He has since successfully developed a custom, comprehensive and proven program that aims to not only keep your business secure but also make sure that hackers know they are not welcome.
Our go-to for anything highly technical, we turn to Izzy for scouting out open risks and seamlessly resolving them. He just makes it easy. Easy to improve security. Easy to minimize cyber attack risks. And easy to guide IT team in implementing security protocols. After all, he spent years in a senior IT position, earning many awards, most notably the Azure Administrator and AWS Certified Solutions Architect certifications.
Chris is our training guru. The reason we love him is because he can break down complex concepts in a way everyone can understand. He also holds two in-company records - most trainings presented in a single day (five!) and most laughs during training. Keep rocking Chris! When he’s not busy with work and community responsibilities, Chris loves to read books and coach his three sons in sports.
Bracha keeps the Keystone process flowing, both in-company and for clients. Using her impressive skillset, Bracha sees Risk Assessment through from interview to report. Her graphic and social engineering skills are also evident in all our security training platforms and phishing tests (thank you Bracha!). Her clear, logical mindset is a real asset to our team - she’ll look for the root of a problem, then find the most efficient way to resolve it.
Doron handles cybersecurity compliance, making sure to keep two steps ahead of the bad guys. By using his exceptional communication skills, he collaborates with auditors and IT departments to make audits as smooth and headache-free as possible. Doron’s as eloquent on paper as he is in real life - aside from academic papers, he’s published a public playbook on ransomware attacks, which teams use to stay more secure.
Chavi is not our right hand, she’s both. She’s all about solving first, asking later. An unpretentious powerhouse, Chavi coordinates new projects, leads risk assessment interviews, creates security awareness trainings and develops whatever else is in need of her expert touch. Deeply respected by colleagues and clients alike for her quick grasp and quicker action, Chavi’s job description in short is: brilliant multitasker, webinar creator, and problem solver. When she’s not hard at work, Chavi enjoys baking and entertaining her two little daughters.
Esther’s coffee is the caffeinated force behind the customized phishing tests and impeccably written reports. She’s always respectful, responsive, and calm, traits that make her client communication sparkle. Aside for her job, which she loves, Esther is a coffee expert (yes, that’s a thing!)