- Fix MSP-Buyers-Guide.html page overflow issues - Fix Service-Overview-OnePager.html content breaks - Add Cybersecurity-OnePager.html with proper page breaks - Set exact page height (11in) to prevent overflow - Add page-break-inside: avoid to all content boxes - Protect tables, callouts, examples from splitting - Add header/paragraph orphan/widow protection - All files now print cleanly without content overrun Changes: - Page containers: exact 11in height with overflow hidden - Content boxes: page-break-inside: avoid - Headers: page-break-after: avoid - Paragraphs: orphans/widows protection - Tables: stay together on single pages Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
16 KiB
Cybersecurity One-Pager Content
Target: Small Business Owners (5-50 employees) Format: Front/Back 8.5" x 11" Last Updated: 2026-02-01
FRONT SIDE: THE THREAT LANDSCAPE
Title
Cybersecurity for Arizona Small Businesses: Why You Can't Afford to Wait
Section 1: The Myth vs. Reality
MYTH: "We're too small to be targeted"
REALITY:
- 43% of cyberattacks target small businesses (Verizon DBIR)
- 60% of small businesses close within 6 months of a major breach
- Average breach cost: $120,000-$200,000 for small businesses
- Hackers use automated tools that target vulnerable systems regardless of company size
Why Small Businesses?
- Easier targets than enterprises (weaker security)
- Valuable data (customer info, financial records, credentials)
- Often lack IT security expertise
- Less likely to detect attacks quickly
Section 2: The Top 5 Threats Facing Tucson Businesses
1. RANSOMWARE - Your Files Held Hostage
What Happens:
- Malware encrypts all your files (documents, photos, databases)
- Attackers demand $10,000-$50,000 payment in cryptocurrency
- Even if you pay, no guarantee you'll get files back
- Business operations halt completely
Real Example:
- Tucson medical practice, 2023
- Ransomware encrypted patient records
- $40,000 ransom demanded
- 2 weeks of downtime
- Total cost: $85,000+ (ransom + recovery + lost revenue)
Statistics:
- 1 in 5 small businesses hit with ransomware (Cybersecurity Ventures)
- Average ransom: $31,000 (but rising)
- 46% of businesses pay the ransom but don't get full data back
2. PHISHING ATTACKS - The Employee Email Trap
What Happens:
- Employee receives email that looks legitimate (bank, vendor, CEO)
- Email contains malicious link or attachment
- One click = stolen credentials or malware installation
- Attacker gains access to systems, email, financial accounts
Real Example:
- "Your invoice is ready" email to accounting department
- Employee downloads "invoice.pdf" (actually malware)
- Attacker steals bank account access
- $47,000 wire transfer to fraudulent account
Statistics:
- 95% of all breaches start with phishing (IBM Security)
- Average organization receives 10+ phishing emails per employee per month
- Only takes ONE click to compromise entire network
3. BUSINESS EMAIL COMPROMISE (BEC) - The CEO Fraud
What Happens:
- Attacker spoofs CEO or vendor email address
- Sends urgent wire transfer request to accounting
- Employee follows "CEO's orders" and wires money
- Funds transferred to offshore account and disappear
Real Example:
- Arizona construction company, 2024
- "CEO" emails CFO: "Need immediate wire transfer for supplier"
- $125,000 sent before fraud discovered
- Money never recovered
Statistics:
- BEC attacks cost businesses $2.4 billion annually (FBI IC3)
- Average loss per incident: $120,000
- 80% of losses are never recovered
4. UNPATCHED SOFTWARE - The Open Door
What Happens:
- Software vendors release security patches monthly
- Unpatched systems have known vulnerabilities
- Hackers scan for vulnerable systems and exploit them
- Automated attacks require zero skill
Real Examples:
- WannaCry (2017): Exploited unpatched Windows systems, affected 300,000+ computers, caused $4 billion in damages
- NotPetya (2017): Unpatched accounting software, $10 billion global damages
Statistics:
- 60% of breaches involve unpatched vulnerabilities (Ponemon Institute)
- Average time from patch release to exploit: 7 days
- Average small business patch lag: 30-60 days (or never)
5. INSIDER THREATS - The Disgruntled Employee
What Happens:
- Former employee still has system access
- Disgruntled employee sells credentials
- Negligent employee falls for phishing
- Contractor overstays access permissions
Real Example:
- Phoenix retail company, 2023
- Fired IT contractor still had admin access
- Deleted customer database and backup files
- $200,000 in recovery costs, lost customers
Statistics:
- 34% of breaches involve internal actors (Verizon DBIR)
- 60% of organizations don't revoke access within 24 hours of termination
- Average cost of insider incident: $484,000
Section 3: The True Cost of a Breach
COST BREAKDOWN (Typical Small Business Breach):
| Cost Category | Range |
|---|---|
| Forensic Investigation | $10,000-$50,000 |
| Legal Fees | $15,000-$100,000 |
| Notification & Credit Monitoring | $5,000-$20,000 |
| Lost Productivity | $25,000-$100,000 |
| Lost Revenue (downtime) | $50,000-$500,000 |
| Regulatory Fines (HIPAA/PCI) | $50,000+ |
| Reputation Damage | Unquantifiable |
| Customer Churn | 25-40% of customers |
TOTAL TYPICAL BREACH COST: $120,000-$1,240,000
Hidden Costs:
- Increased cyber insurance premiums (200-400%)
- Lost business opportunities (RFPs requiring security certifications)
- Employee morale and turnover
- Management time dealing with incident (hundreds of hours)
Section 4: Warning Signs You're At Risk
Check ALL that apply:
- Using Windows 7 or older operating systems
- No centralized patch management system
- Employees use personal email for work communications
- No multi-factor authentication (MFA) on critical systems
- Passwords shared via text message or email
- No email security filtering beyond basic spam blocking
- No endpoint security (or just basic consumer antivirus)
- No backup system or untested disaster recovery plan
- No security awareness training program
- IT handled by "someone's nephew" or no dedicated IT
- Staff reuse same password across multiple sites
- No documented offboarding process (former employees keep access)
- No network segmentation (everything on same network)
- Critical systems accessible from home with no VPN
SCORING:
- 0-2 checked: You're doing better than average (but still at risk)
- 3-5 checked: HIGH RISK - You're a prime target
- 6+ checked: CRITICAL RISK - Breach is likely imminent
If 3 or more boxes are checked, you need immediate security improvements.
BACK SIDE: THE GPS SOLUTION
Section 1: How GPS Protects Tucson Businesses
GPS uses a 3-layer security approach to stop attacks before they succeed:
LAYER 1: PREVENTION - Stop Attacks Before They Happen
Advanced Endpoint Detection & Response (EDR)
- Not just antivirus—stops unknown threats using AI and behavioral analysis
- Blocks ransomware before it encrypts files
- Detects and stops fileless attacks
- Prevents credential theft and lateral movement
DNS Filtering
- Blocks access to known malicious websites automatically
- Prevents phishing site visits (even if employee clicks link)
- Stops malware command-and-control communication
- Enforces safe browsing policies
Email Security (MailProtector/INKY)
- Advanced anti-phishing filters analyze sender behavior
- Banner warnings on external emails
- Blocks spoofed CEO/vendor emails (BEC prevention)
- Quarantines malicious attachments before delivery
Automated Patch Management
- Critical security patches deployed within 24 hours
- Operating system, applications, firmware all covered
- Tested deployment to prevent disruption
- Compliance reporting for audits
Security Awareness Training
- Monthly interactive phishing simulations
- Quarterly training modules on current threats
- Track employee security scores
- Turn employees from weakness into defense layer
LAYER 2: DETECTION - Catch Threats That Slip Through
24/7 Monitoring & Alerting
- Real-time threat detection on all endpoints
- Security Operations Center (SOC) reviewing alerts
- Anomaly detection for unusual behavior
- Immediate notification of critical threats
Dark Web Monitoring
- Scans dark web marketplaces for leaked credentials
- Alerts if employee or company data found for sale
- Proactive password reset before attackers strike
- Breach notification reports
Behavioral Analysis
- Detects unusual login times/locations
- Identifies abnormal file access patterns
- Flags unusual network traffic
- Catches insider threats
Real-Time Security Logs
- Complete audit trail of all system activity
- Failed login attempt tracking
- File access and modification logs
- Network connection monitoring
LAYER 3: RESPONSE - Minimize Damage If Breach Occurs
Incident Response Plan
- Documented procedures for every threat type
- Clear escalation paths and responsibilities
- Communication templates for customers/vendors
- Legal and compliance guidance
Managed Backups
- Automated daily backups of all critical systems
- Offsite encrypted storage (3-2-1 backup rule)
- Regular restore testing (monthly)
- Recovery Time Objective: 4 hours
Ransomware Rollback
- Automatic snapshot technology
- Restore encrypted files within hours without paying ransom
- Minimal data loss (RPO: 1 hour)
- Business continuity maintained
Legal & Compliance Support
- Breach notification assistance (state and federal requirements)
- Cyber insurance claim support and documentation
- Regulatory compliance reporting (HIPAA, PCI-DSS)
- Forensic investigation coordination
Section 2: GPS Tiers & Security Features Comparison
| Security Feature | GPS-BASIC ($19/endpoint) | GPS-PRO ($26/endpoint) | GPS-ADVANCED ($39/endpoint) |
|---|---|---|---|
| Core Protection | |||
| Antivirus & Anti-malware | [OK] | [OK] | [OK] |
| 24/7 Monitoring & Alerting | [OK] | [OK] | [OK] |
| Automated Patch Management | [OK] | [OK] | [OK] |
| Monthly Health Reports | [OK] | [OK] | [OK] |
| Remote Management | [OK] | [OK] | [OK] |
| Advanced Security | |||
| Advanced EDR (Endpoint Detection & Response) | - | [OK] | [OK] |
| Email Security (Anti-phishing) | - | [OK] | [OK] |
| DNS Filtering (Web Protection) | - | [OK] | [OK] |
| Dark Web Monitoring | - | [OK] | [OK] |
| Security Awareness Training | - | [OK] | [OK] |
| Cloud App Monitoring (M365/Google) | - | [OK] | [OK] |
| Maximum Protection | |||
| Advanced Threat Intelligence | - | - | [OK] |
| Ransomware Rollback | - | - | [OK] |
| Compliance Tools (HIPAA/PCI/SOC2) | - | - | [OK] |
| Priority Incident Response | - | - | [OK] |
| Enhanced SaaS Backup | - | - | [OK] |
| Forensic Investigation Support | - | - | [OK] |
RECOMMENDED:
- GPS-PRO for most businesses
- GPS-ADVANCED for regulated industries (medical, legal, finance)
- GPS-BASIC only for very simple environments with minimal risk
Section 3: Real Client Success Story
CASE STUDY: Southwest Legal Partners
The Situation:
- 18-employee law firm in Tucson
- Sophisticated phishing attack targeting accounting department
- Email spoofed from managing partner requesting wire transfer
- Malicious attachment designed to steal credentials
GPS Response:
- Email security flagged spoofed sender (external email with internal display name)
- Banner warning displayed: "EXTERNAL EMAIL - Verify sender"
- EDR detected malicious attachment, quarantined immediately
- Alert sent to GPS SOC within 45 seconds
- Endpoint isolated from network automatically
- Accounting staff received immediate security training refresher
Outcome:
- Zero data loss
- Zero downtime
- Zero financial loss
- Attack prevented before any damage
Potential Breach Cost Without GPS:
- Credential theft + fraudulent wire transfer: $75,000-$150,000
- Client data exposure + breach notification: $30,000
- Regulatory investigation (attorney-client privilege): $50,000+
- Reputation damage to law firm: Unquantifiable
GPS Monthly Investment: $702/month (18 endpoints × $26 + $234 support)
ROI: One prevented breach paid for 8-17 YEARS of GPS protection
Section 4: ROI Calculator - Your Security Investment vs. Breach Cost
EXAMPLE: 15-Employee Business
GPS-PRO Investment:
15 endpoints × $26/month = $390/month
Email security (15 × $3) = $45/month
Standard Support Plan = $380/month
-----------------------------------------
Total Monthly: $815/month
Annual Investment: $9,780/year
Average Breach Cost for 15-Employee Business:
Low-end breach: $120,000
High-end breach: $200,000
Breach Prevention ROI:
$120,000 ÷ $9,780 = 12.3 years of GPS protection
$200,000 ÷ $9,780 = 20.4 years of GPS protection
ROI Percentage: 1,200-2,000%
ONE PREVENTED BREACH PAYS FOR 12-20 YEARS OF GPS
WHAT IF YOU'RE NOT BREACHED?
Even without a breach, GPS provides value:
- Cyber Insurance Discounts: 10-25% premium reduction (saves $1,000-5,000/year)
- Compliance Efficiency: Automated reporting saves 40+ hours/year ($4,000-8,000)
- Reduced Downtime: Proactive monitoring prevents outages (saves $10,000+/year)
- Employee Productivity: Less malware/slowness = 2-5% productivity gain ($15,000-30,000/year)
Conservative Annual Value: $30,000-50,000
GPS pays for itself even if you're NEVER breached.
Section 5: Free Security Risk Assessment
GET YOUR FREE SECURITY RISK ASSESSMENT
What We'll Do (No Obligation):
-
External Vulnerability Scan
- Scan your public-facing systems for exploitable vulnerabilities
- Identify open ports and exposed services
- Check for outdated software versions
- Test for common misconfigurations
-
Dark Web Scan
- Search dark web marketplaces for your company domain
- Identify any leaked employee credentials
- Check for breached vendor accounts
- Report any compromised data found
-
Email Security Test
- Send simulated phishing emails (with permission)
- Measure employee susceptibility
- Identify high-risk users
- Provide training recommendations
-
Written Report with Risk Score
- Detailed findings for each risk area
- Severity ratings (Critical/High/Medium/Low)
- Prioritized remediation roadmap
- Estimated cost of fixing each issue
-
Custom GPS Recommendation
- Right-sized protection tier for your business
- Exact monthly cost breakdown
- Implementation timeline
- No pressure, no sales pitch
Assessment Timeline: 3-5 business days Your Investment: $0 Our Investment: $500 (waived for assessment participants)
Section 6: Call to Action
CONTACT ARIZONA COMPUTER GURU
Schedule Your Free Security Assessment:
Phone: 520.304.8300 Email: security@azcomputerguru.com Web: azcomputerguru.com/security-assessment
Office Location: 7437 E. 22nd St, Tucson, AZ 85710 (We're local—you can visit us anytime)
Office Hours: Monday-Friday: 8:00 AM - 5:00 PM Emergency Support: 24/7 for GPS clients
Section 7: Guarantee & Special Offer
30-DAY MONEY-BACK GUARANTEE
If GPS doesn't give you peace of mind about your cybersecurity in the first 30 days, we'll refund 100% of your fees. No questions asked.
NEW CLIENT SPECIAL OFFER
Sign up within 30 days and receive:
- [OK] Waived setup fees (normally $500)
- [OK] First month 50% off support plan (save $190-425)
- [OK] Free comprehensive security assessment ($500 value)
- [OK] Free dark web monitoring scan ($200 value)
- [OK] Free phishing simulation for all employees ($300 value)
Total Value: $1,500-1,925
Mention code "SECURITY2026" when you call.
BOTTOM TAGLINE: "Protecting Tucson Businesses from Cyber Threats Since 2001"
Design Notes
Color Palette:
- Primary Blue: #1e3c72 (headings, borders)
- Orange: #f39c12 (highlights, CTAs)
- Red: #dc3545 (threat warnings, cost boxes)
- Green: #27ae60 (protection features, checkmarks)
- Gray: #666 (body text)
Visual Elements:
- Warning icons for threat section
- Shield/checkmark icons for protection features
- Red background boxes for breach costs
- Green background boxes for GPS protection
- Gradient backgrounds for CTA sections
- Tables with proper borders and shading
Typography:
- Font: Segoe UI
- Headings: Bold, dark blue
- Body: 11-12pt, gray
- Callouts: 10-11pt, colored backgrounds
Layout:
- 8.5" × 11" front/back
- 0.5" margins all sides
- Clear visual hierarchy
- Scannable sections with headers
- Proper white space