- Fix MSP-Buyers-Guide.html page overflow issues - Fix Service-Overview-OnePager.html content breaks - Add Cybersecurity-OnePager.html with proper page breaks - Set exact page height (11in) to prevent overflow - Add page-break-inside: avoid to all content boxes - Protect tables, callouts, examples from splitting - Add header/paragraph orphan/widow protection - All files now print cleanly without content overrun Changes: - Page containers: exact 11in height with overflow hidden - Content boxes: page-break-inside: avoid - Headers: page-break-after: avoid - Paragraphs: orphans/widows protection - Tables: stay together on single pages Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
515 lines
16 KiB
Markdown
515 lines
16 KiB
Markdown
# Cybersecurity One-Pager Content
|
||
**Target:** Small Business Owners (5-50 employees)
|
||
**Format:** Front/Back 8.5" x 11"
|
||
**Last Updated:** 2026-02-01
|
||
|
||
---
|
||
|
||
## FRONT SIDE: THE THREAT LANDSCAPE
|
||
|
||
### Title
|
||
**Cybersecurity for Arizona Small Businesses: Why You Can't Afford to Wait**
|
||
|
||
### Section 1: The Myth vs. Reality
|
||
|
||
**MYTH:** "We're too small to be targeted"
|
||
|
||
**REALITY:**
|
||
- **43% of cyberattacks target small businesses** (Verizon DBIR)
|
||
- **60% of small businesses close within 6 months** of a major breach
|
||
- **Average breach cost: $120,000-$200,000** for small businesses
|
||
- Hackers use automated tools that target vulnerable systems regardless of company size
|
||
|
||
**Why Small Businesses?**
|
||
- Easier targets than enterprises (weaker security)
|
||
- Valuable data (customer info, financial records, credentials)
|
||
- Often lack IT security expertise
|
||
- Less likely to detect attacks quickly
|
||
|
||
---
|
||
|
||
### Section 2: The Top 5 Threats Facing Tucson Businesses
|
||
|
||
#### 1. RANSOMWARE - Your Files Held Hostage
|
||
**What Happens:**
|
||
- Malware encrypts all your files (documents, photos, databases)
|
||
- Attackers demand $10,000-$50,000 payment in cryptocurrency
|
||
- Even if you pay, no guarantee you'll get files back
|
||
- Business operations halt completely
|
||
|
||
**Real Example:**
|
||
- Tucson medical practice, 2023
|
||
- Ransomware encrypted patient records
|
||
- $40,000 ransom demanded
|
||
- 2 weeks of downtime
|
||
- Total cost: $85,000+ (ransom + recovery + lost revenue)
|
||
|
||
**Statistics:**
|
||
- 1 in 5 small businesses hit with ransomware (Cybersecurity Ventures)
|
||
- Average ransom: $31,000 (but rising)
|
||
- 46% of businesses pay the ransom but don't get full data back
|
||
|
||
---
|
||
|
||
#### 2. PHISHING ATTACKS - The Employee Email Trap
|
||
**What Happens:**
|
||
- Employee receives email that looks legitimate (bank, vendor, CEO)
|
||
- Email contains malicious link or attachment
|
||
- One click = stolen credentials or malware installation
|
||
- Attacker gains access to systems, email, financial accounts
|
||
|
||
**Real Example:**
|
||
- "Your invoice is ready" email to accounting department
|
||
- Employee downloads "invoice.pdf" (actually malware)
|
||
- Attacker steals bank account access
|
||
- $47,000 wire transfer to fraudulent account
|
||
|
||
**Statistics:**
|
||
- **95% of all breaches start with phishing** (IBM Security)
|
||
- Average organization receives 10+ phishing emails per employee per month
|
||
- Only takes ONE click to compromise entire network
|
||
|
||
---
|
||
|
||
#### 3. BUSINESS EMAIL COMPROMISE (BEC) - The CEO Fraud
|
||
**What Happens:**
|
||
- Attacker spoofs CEO or vendor email address
|
||
- Sends urgent wire transfer request to accounting
|
||
- Employee follows "CEO's orders" and wires money
|
||
- Funds transferred to offshore account and disappear
|
||
|
||
**Real Example:**
|
||
- Arizona construction company, 2024
|
||
- "CEO" emails CFO: "Need immediate wire transfer for supplier"
|
||
- $125,000 sent before fraud discovered
|
||
- Money never recovered
|
||
|
||
**Statistics:**
|
||
- **BEC attacks cost businesses $2.4 billion annually** (FBI IC3)
|
||
- Average loss per incident: $120,000
|
||
- 80% of losses are never recovered
|
||
|
||
---
|
||
|
||
#### 4. UNPATCHED SOFTWARE - The Open Door
|
||
**What Happens:**
|
||
- Software vendors release security patches monthly
|
||
- Unpatched systems have known vulnerabilities
|
||
- Hackers scan for vulnerable systems and exploit them
|
||
- Automated attacks require zero skill
|
||
|
||
**Real Examples:**
|
||
- **WannaCry (2017):** Exploited unpatched Windows systems, affected 300,000+ computers, caused $4 billion in damages
|
||
- **NotPetya (2017):** Unpatched accounting software, $10 billion global damages
|
||
|
||
**Statistics:**
|
||
- **60% of breaches involve unpatched vulnerabilities** (Ponemon Institute)
|
||
- Average time from patch release to exploit: **7 days**
|
||
- Average small business patch lag: **30-60 days** (or never)
|
||
|
||
---
|
||
|
||
#### 5. INSIDER THREATS - The Disgruntled Employee
|
||
**What Happens:**
|
||
- Former employee still has system access
|
||
- Disgruntled employee sells credentials
|
||
- Negligent employee falls for phishing
|
||
- Contractor overstays access permissions
|
||
|
||
**Real Example:**
|
||
- Phoenix retail company, 2023
|
||
- Fired IT contractor still had admin access
|
||
- Deleted customer database and backup files
|
||
- $200,000 in recovery costs, lost customers
|
||
|
||
**Statistics:**
|
||
- **34% of breaches involve internal actors** (Verizon DBIR)
|
||
- 60% of organizations don't revoke access within 24 hours of termination
|
||
- Average cost of insider incident: $484,000
|
||
|
||
---
|
||
|
||
### Section 3: The True Cost of a Breach
|
||
|
||
**COST BREAKDOWN (Typical Small Business Breach):**
|
||
|
||
| Cost Category | Range |
|
||
|--------------|-------|
|
||
| **Forensic Investigation** | $10,000-$50,000 |
|
||
| **Legal Fees** | $15,000-$100,000 |
|
||
| **Notification & Credit Monitoring** | $5,000-$20,000 |
|
||
| **Lost Productivity** | $25,000-$100,000 |
|
||
| **Lost Revenue (downtime)** | $50,000-$500,000 |
|
||
| **Regulatory Fines (HIPAA/PCI)** | $50,000+ |
|
||
| **Reputation Damage** | Unquantifiable |
|
||
| **Customer Churn** | 25-40% of customers |
|
||
|
||
**TOTAL TYPICAL BREACH COST: $120,000-$1,240,000**
|
||
|
||
**Hidden Costs:**
|
||
- Increased cyber insurance premiums (200-400%)
|
||
- Lost business opportunities (RFPs requiring security certifications)
|
||
- Employee morale and turnover
|
||
- Management time dealing with incident (hundreds of hours)
|
||
|
||
---
|
||
|
||
### Section 4: Warning Signs You're At Risk
|
||
|
||
**Check ALL that apply:**
|
||
|
||
- [ ] Using Windows 7 or older operating systems
|
||
- [ ] No centralized patch management system
|
||
- [ ] Employees use personal email for work communications
|
||
- [ ] No multi-factor authentication (MFA) on critical systems
|
||
- [ ] Passwords shared via text message or email
|
||
- [ ] No email security filtering beyond basic spam blocking
|
||
- [ ] No endpoint security (or just basic consumer antivirus)
|
||
- [ ] No backup system or untested disaster recovery plan
|
||
- [ ] No security awareness training program
|
||
- [ ] IT handled by "someone's nephew" or no dedicated IT
|
||
- [ ] Staff reuse same password across multiple sites
|
||
- [ ] No documented offboarding process (former employees keep access)
|
||
- [ ] No network segmentation (everything on same network)
|
||
- [ ] Critical systems accessible from home with no VPN
|
||
|
||
**SCORING:**
|
||
- **0-2 checked:** You're doing better than average (but still at risk)
|
||
- **3-5 checked:** HIGH RISK - You're a prime target
|
||
- **6+ checked:** CRITICAL RISK - Breach is likely imminent
|
||
|
||
**If 3 or more boxes are checked, you need immediate security improvements.**
|
||
|
||
---
|
||
|
||
## BACK SIDE: THE GPS SOLUTION
|
||
|
||
### Section 1: How GPS Protects Tucson Businesses
|
||
|
||
**GPS uses a 3-layer security approach to stop attacks before they succeed:**
|
||
|
||
---
|
||
|
||
#### LAYER 1: PREVENTION - Stop Attacks Before They Happen
|
||
|
||
**Advanced Endpoint Detection & Response (EDR)**
|
||
- Not just antivirus—stops unknown threats using AI and behavioral analysis
|
||
- Blocks ransomware before it encrypts files
|
||
- Detects and stops fileless attacks
|
||
- Prevents credential theft and lateral movement
|
||
|
||
**DNS Filtering**
|
||
- Blocks access to known malicious websites automatically
|
||
- Prevents phishing site visits (even if employee clicks link)
|
||
- Stops malware command-and-control communication
|
||
- Enforces safe browsing policies
|
||
|
||
**Email Security (MailProtector/INKY)**
|
||
- Advanced anti-phishing filters analyze sender behavior
|
||
- Banner warnings on external emails
|
||
- Blocks spoofed CEO/vendor emails (BEC prevention)
|
||
- Quarantines malicious attachments before delivery
|
||
|
||
**Automated Patch Management**
|
||
- Critical security patches deployed within 24 hours
|
||
- Operating system, applications, firmware all covered
|
||
- Tested deployment to prevent disruption
|
||
- Compliance reporting for audits
|
||
|
||
**Security Awareness Training**
|
||
- Monthly interactive phishing simulations
|
||
- Quarterly training modules on current threats
|
||
- Track employee security scores
|
||
- Turn employees from weakness into defense layer
|
||
|
||
---
|
||
|
||
#### LAYER 2: DETECTION - Catch Threats That Slip Through
|
||
|
||
**24/7 Monitoring & Alerting**
|
||
- Real-time threat detection on all endpoints
|
||
- Security Operations Center (SOC) reviewing alerts
|
||
- Anomaly detection for unusual behavior
|
||
- Immediate notification of critical threats
|
||
|
||
**Dark Web Monitoring**
|
||
- Scans dark web marketplaces for leaked credentials
|
||
- Alerts if employee or company data found for sale
|
||
- Proactive password reset before attackers strike
|
||
- Breach notification reports
|
||
|
||
**Behavioral Analysis**
|
||
- Detects unusual login times/locations
|
||
- Identifies abnormal file access patterns
|
||
- Flags unusual network traffic
|
||
- Catches insider threats
|
||
|
||
**Real-Time Security Logs**
|
||
- Complete audit trail of all system activity
|
||
- Failed login attempt tracking
|
||
- File access and modification logs
|
||
- Network connection monitoring
|
||
|
||
---
|
||
|
||
#### LAYER 3: RESPONSE - Minimize Damage If Breach Occurs
|
||
|
||
**Incident Response Plan**
|
||
- Documented procedures for every threat type
|
||
- Clear escalation paths and responsibilities
|
||
- Communication templates for customers/vendors
|
||
- Legal and compliance guidance
|
||
|
||
**Managed Backups**
|
||
- Automated daily backups of all critical systems
|
||
- Offsite encrypted storage (3-2-1 backup rule)
|
||
- Regular restore testing (monthly)
|
||
- Recovery Time Objective: 4 hours
|
||
|
||
**Ransomware Rollback**
|
||
- Automatic snapshot technology
|
||
- Restore encrypted files within hours without paying ransom
|
||
- Minimal data loss (RPO: 1 hour)
|
||
- Business continuity maintained
|
||
|
||
**Legal & Compliance Support**
|
||
- Breach notification assistance (state and federal requirements)
|
||
- Cyber insurance claim support and documentation
|
||
- Regulatory compliance reporting (HIPAA, PCI-DSS)
|
||
- Forensic investigation coordination
|
||
|
||
---
|
||
|
||
### Section 2: GPS Tiers & Security Features Comparison
|
||
|
||
| Security Feature | GPS-BASIC ($19/endpoint) | GPS-PRO ($26/endpoint) | GPS-ADVANCED ($39/endpoint) |
|
||
|-----------------|-------------------------|------------------------|----------------------------|
|
||
| **Core Protection** | | | |
|
||
| Antivirus & Anti-malware | [OK] | [OK] | [OK] |
|
||
| 24/7 Monitoring & Alerting | [OK] | [OK] | [OK] |
|
||
| Automated Patch Management | [OK] | [OK] | [OK] |
|
||
| Monthly Health Reports | [OK] | [OK] | [OK] |
|
||
| Remote Management | [OK] | [OK] | [OK] |
|
||
| **Advanced Security** | | | |
|
||
| Advanced EDR (Endpoint Detection & Response) | - | [OK] | [OK] |
|
||
| Email Security (Anti-phishing) | - | [OK] | [OK] |
|
||
| DNS Filtering (Web Protection) | - | [OK] | [OK] |
|
||
| Dark Web Monitoring | - | [OK] | [OK] |
|
||
| Security Awareness Training | - | [OK] | [OK] |
|
||
| Cloud App Monitoring (M365/Google) | - | [OK] | [OK] |
|
||
| **Maximum Protection** | | | |
|
||
| Advanced Threat Intelligence | - | - | [OK] |
|
||
| Ransomware Rollback | - | - | [OK] |
|
||
| Compliance Tools (HIPAA/PCI/SOC2) | - | - | [OK] |
|
||
| Priority Incident Response | - | - | [OK] |
|
||
| Enhanced SaaS Backup | - | - | [OK] |
|
||
| Forensic Investigation Support | - | - | [OK] |
|
||
|
||
**RECOMMENDED:**
|
||
- **GPS-PRO** for most businesses
|
||
- **GPS-ADVANCED** for regulated industries (medical, legal, finance)
|
||
- **GPS-BASIC** only for very simple environments with minimal risk
|
||
|
||
---
|
||
|
||
### Section 3: Real Client Success Story
|
||
|
||
**CASE STUDY: Southwest Legal Partners**
|
||
|
||
**The Situation:**
|
||
- 18-employee law firm in Tucson
|
||
- Sophisticated phishing attack targeting accounting department
|
||
- Email spoofed from managing partner requesting wire transfer
|
||
- Malicious attachment designed to steal credentials
|
||
|
||
**GPS Response:**
|
||
- Email security flagged spoofed sender (external email with internal display name)
|
||
- Banner warning displayed: "EXTERNAL EMAIL - Verify sender"
|
||
- EDR detected malicious attachment, quarantined immediately
|
||
- Alert sent to GPS SOC within 45 seconds
|
||
- Endpoint isolated from network automatically
|
||
- Accounting staff received immediate security training refresher
|
||
|
||
**Outcome:**
|
||
- Zero data loss
|
||
- Zero downtime
|
||
- Zero financial loss
|
||
- Attack prevented before any damage
|
||
|
||
**Potential Breach Cost Without GPS:**
|
||
- Credential theft + fraudulent wire transfer: $75,000-$150,000
|
||
- Client data exposure + breach notification: $30,000
|
||
- Regulatory investigation (attorney-client privilege): $50,000+
|
||
- Reputation damage to law firm: Unquantifiable
|
||
|
||
**GPS Monthly Investment:** $702/month (18 endpoints × $26 + $234 support)
|
||
|
||
**ROI:** One prevented breach paid for **8-17 YEARS** of GPS protection
|
||
|
||
---
|
||
|
||
### Section 4: ROI Calculator - Your Security Investment vs. Breach Cost
|
||
|
||
**EXAMPLE: 15-Employee Business**
|
||
|
||
**GPS-PRO Investment:**
|
||
```
|
||
15 endpoints × $26/month = $390/month
|
||
Email security (15 × $3) = $45/month
|
||
Standard Support Plan = $380/month
|
||
-----------------------------------------
|
||
Total Monthly: $815/month
|
||
Annual Investment: $9,780/year
|
||
```
|
||
|
||
**Average Breach Cost for 15-Employee Business:**
|
||
```
|
||
Low-end breach: $120,000
|
||
High-end breach: $200,000
|
||
```
|
||
|
||
**Breach Prevention ROI:**
|
||
```
|
||
$120,000 ÷ $9,780 = 12.3 years of GPS protection
|
||
$200,000 ÷ $9,780 = 20.4 years of GPS protection
|
||
```
|
||
|
||
**ROI Percentage:** 1,200-2,000%
|
||
|
||
**ONE PREVENTED BREACH PAYS FOR 12-20 YEARS OF GPS**
|
||
|
||
---
|
||
|
||
**WHAT IF YOU'RE NOT BREACHED?**
|
||
|
||
Even without a breach, GPS provides value:
|
||
|
||
- **Cyber Insurance Discounts:** 10-25% premium reduction (saves $1,000-5,000/year)
|
||
- **Compliance Efficiency:** Automated reporting saves 40+ hours/year ($4,000-8,000)
|
||
- **Reduced Downtime:** Proactive monitoring prevents outages (saves $10,000+/year)
|
||
- **Employee Productivity:** Less malware/slowness = 2-5% productivity gain ($15,000-30,000/year)
|
||
|
||
**Conservative Annual Value:** $30,000-50,000
|
||
|
||
**GPS pays for itself even if you're NEVER breached.**
|
||
|
||
---
|
||
|
||
### Section 5: Free Security Risk Assessment
|
||
|
||
**GET YOUR FREE SECURITY RISK ASSESSMENT**
|
||
|
||
**What We'll Do (No Obligation):**
|
||
|
||
1. **External Vulnerability Scan**
|
||
- Scan your public-facing systems for exploitable vulnerabilities
|
||
- Identify open ports and exposed services
|
||
- Check for outdated software versions
|
||
- Test for common misconfigurations
|
||
|
||
2. **Dark Web Scan**
|
||
- Search dark web marketplaces for your company domain
|
||
- Identify any leaked employee credentials
|
||
- Check for breached vendor accounts
|
||
- Report any compromised data found
|
||
|
||
3. **Email Security Test**
|
||
- Send simulated phishing emails (with permission)
|
||
- Measure employee susceptibility
|
||
- Identify high-risk users
|
||
- Provide training recommendations
|
||
|
||
4. **Written Report with Risk Score**
|
||
- Detailed findings for each risk area
|
||
- Severity ratings (Critical/High/Medium/Low)
|
||
- Prioritized remediation roadmap
|
||
- Estimated cost of fixing each issue
|
||
|
||
5. **Custom GPS Recommendation**
|
||
- Right-sized protection tier for your business
|
||
- Exact monthly cost breakdown
|
||
- Implementation timeline
|
||
- No pressure, no sales pitch
|
||
|
||
**Assessment Timeline:** 3-5 business days
|
||
**Your Investment:** $0
|
||
**Our Investment:** $500 (waived for assessment participants)
|
||
|
||
---
|
||
|
||
### Section 6: Call to Action
|
||
|
||
**CONTACT ARIZONA COMPUTER GURU**
|
||
|
||
**Schedule Your Free Security Assessment:**
|
||
|
||
**Phone:** 520.304.8300
|
||
**Email:** security@azcomputerguru.com
|
||
**Web:** azcomputerguru.com/security-assessment
|
||
|
||
**Office Location:**
|
||
7437 E. 22nd St, Tucson, AZ 85710
|
||
(We're local—you can visit us anytime)
|
||
|
||
**Office Hours:**
|
||
Monday-Friday: 8:00 AM - 5:00 PM
|
||
Emergency Support: 24/7 for GPS clients
|
||
|
||
---
|
||
|
||
### Section 7: Guarantee & Special Offer
|
||
|
||
**30-DAY MONEY-BACK GUARANTEE**
|
||
|
||
If GPS doesn't give you peace of mind about your cybersecurity in the first 30 days, we'll refund 100% of your fees. No questions asked.
|
||
|
||
**NEW CLIENT SPECIAL OFFER**
|
||
|
||
**Sign up within 30 days and receive:**
|
||
- [OK] Waived setup fees (normally $500)
|
||
- [OK] First month 50% off support plan (save $190-425)
|
||
- [OK] Free comprehensive security assessment ($500 value)
|
||
- [OK] Free dark web monitoring scan ($200 value)
|
||
- [OK] Free phishing simulation for all employees ($300 value)
|
||
|
||
**Total Value: $1,500-1,925**
|
||
|
||
**Mention code "SECURITY2026" when you call.**
|
||
|
||
---
|
||
|
||
**BOTTOM TAGLINE:**
|
||
"Protecting Tucson Businesses from Cyber Threats Since 2001"
|
||
|
||
---
|
||
|
||
## Design Notes
|
||
|
||
**Color Palette:**
|
||
- Primary Blue: #1e3c72 (headings, borders)
|
||
- Orange: #f39c12 (highlights, CTAs)
|
||
- Red: #dc3545 (threat warnings, cost boxes)
|
||
- Green: #27ae60 (protection features, checkmarks)
|
||
- Gray: #666 (body text)
|
||
|
||
**Visual Elements:**
|
||
- Warning icons for threat section
|
||
- Shield/checkmark icons for protection features
|
||
- Red background boxes for breach costs
|
||
- Green background boxes for GPS protection
|
||
- Gradient backgrounds for CTA sections
|
||
- Tables with proper borders and shading
|
||
|
||
**Typography:**
|
||
- Font: Segoe UI
|
||
- Headings: Bold, dark blue
|
||
- Body: 11-12pt, gray
|
||
- Callouts: 10-11pt, colored backgrounds
|
||
|
||
**Layout:**
|
||
- 8.5" × 11" front/back
|
||
- 0.5" margins all sides
|
||
- Clear visual hierarchy
|
||
- Scannable sections with headers
|
||
- Proper white space
|