Frequently Asked Questions to Ensure a Secure Network

What's holding you back from having a secure network?

Now that you can see the advantages of TARA CTA to have a secure network, what’s holding you back? It’s important to recognize some of the leading misconceptions that could affect your  decision:

We have never had a problem.

The average data breach takes 9 months to discover, but TARA CTA can tell you any current issues. Plus, it identifies critical security weakness that will cause problems—so you avoid being impacted by a problem. When you do have a problem—it is too late.

We are too small to be a target.

54% of SMBs believe they are too small. Yet 43% of all cyberattacks target SMBs since they often have the weakest security and often provide a direct [connection] path to larger organizations.

My data isn’t worth anything.

Others felt similarly until they were hit. Many suffer massive business disruptions, plus the incredible loss in reputation when they have to notify their customers.  On top of all that, there is the unexpected cost to pay for possible credit remediations. Ouch!

Not enough time.

TARA CTA can be set up and operational in 48 hours. If it isn’t ready, your first month is free.

How can TARA CTA be so affordable?

The same technology used to calculate risk was launched on a different TARA platform four years ago. By leveraging prior investments and streamlining content delivery, TARA CTA is the undisputed price performance leader making cyber risk monitoring affordable for organizations of all sizes.   

Why is alerting important?

TARA CTA provides great insights on evolving cyber threats but not everyone has the time to look at it daily.  Alerting sends an email to your designated support contact (external or internal) to notify them when any category shifts from green (good) to red (questionable).  

How do I prioritize fixing items?

Establishing a process and dedicating resources (external or internal) for addressing TARA CTA findings is the first step toward fixing them. The key categories to focus on are Open Ports, Remote Desktop Services, and External Vulnerabilities as they represent the most risk exposure for organizations. Prioritizing vulnerabilities is simple since they are assigned a risk score. As a guideline any vulnerability with a score above 650 should be addressed as a top priority.

Why are breached credentials important (and what should we do)?

Data breaches from other companies can include email and passwords from your organization. TARA CTA collects findings and highlights any credentials from your organization that were part of a public breach. Ensure that any breached email address is forced to rest the password and/or is updated with a suitable two-factor authentication tool.  If the breached email address is for an employee that is no longer with the organization, ensure that the record is deleted from your email system. 

How is the overall risk score calculated?

The overall risk score is based on a proprietary blend of calculations that are influenced by the total issues identified and the relative risk they represent.  The industry averages are calculated from a pool of more than 500,000 organizations used to develop trends across 22 categories. 

Can we monitor multiple locations?

Yes, any organization can use TARA CTA to track multiple locations for operations. When completing the enrollment form, ensure that the internet address (IP) for each location is included in the details provided.

START TODAY

TARA CTA Pricing

Built to meet the specialized cybersecurity needs of SMBs, TARA CTA is billed monthly based on the total number of employees in your company. Pricing that starts at just $299 per month. We deliver risk coverage within 48 hours of receiving your enrollment form or the first month of TARA CTA is free!