CTI Logo / Home

contact us

ph: (215) 395-8900


Rest assured.

Information related to CTI's procedures and our three prong approach to network security
Backups & Data Security
Local Data Backup Installation of a NAS(network attached storage) handles fast local backups and encryption of server data and workstations.
Cloud Data Backup Enterprise cloud solutions guarantee data is always safe and available.
Data Loss Disaster Recovery Assessment and retrieval of corrupted or lost data whether one bad file or an entire malfunctioning hard drive.
Data Security Strategic privilege management, data encryption, and information architecture ensure only users with the proper credentials have access to sensitive files.
Secure Data Destruction A system of redundant erasing, crippling, and dismantling leaves no trace of previous data on retired hard drives.

Network Security & Antivirus
Email Encryption Send and receive secure emails containing sensitive information without any worry of interception.
Anti-Virus An enterprise anti-virus solution automatically updated with the latest virus definitions constantly examines software and files before opening them and scans browser search results for possibly malicious sites.
Computer Virus Recovery Immediately the threat is isolated before more damage can be done and then expert CTI staff members assess the situation and determine the best options for virus removal.
Network Monitoring Automated logging of possible malicious cyber activity and content filtering.
Firewall Configuration Lock down the traffic streaming in and out of a network with a device which can quickly process all of a business's data transfers while regulating access.

Education & Awareness
Employee Training Group or one-on-one sessions helping users to understand the importance of safe practices and learn better procedures which fit their work flow and keep a company secure.
Helpful Articles Periodic articles provide a basic knowlege of terminology and on-going changes in the field of data security.
Threat Alerts Clients receive communications about current situations which may dictate an immediate response and awareness such as a dangerous exploit or changes in security best practices.
Security Audits A careful inspection of a business's network and practices determines vulnerability and reveals necessary corrective measures.
HIPAA/PCI Compliance Audits A network security audit with applicable regulations in mind will determine if a business is operating within the bounds of government statuts which govern a particular industry.

CTI Technical Services • 1810 County Line Road, Suite 408 • Huntingdon Valley PA 19006 • E-Mail: • Phone: (215) 395-8900 • Fax: (215) 355-4907

Close Contact Screen