Search

TERMS & CONDITIONS

FAQ

Most frequent questions and answers

A Virtual Private Network (VPN) allows you to connect an endpoint such as a computer or cell phone onto your businesses network. This would allow access to any internal business assets that are not publicly available. While this connection is established, all network traffic is encrypted and cannot be openly seen by an external party. For additional information watch this video.

Per National Institute of Standards and Technology, a vulnerability is a weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.

Response times vary dependent on customer service level agreements and requirements. Typically, a response is given to the customer withing 4-8 hours at a minimum. After initial triage of the incident is completed an estimated resolution time will be given. Resolution times will be dependent on complexity of issue, licensing, and possibly hardware availability.

Managed IT Services are provided to businesses by a Managed Service Provider (MSP). The MSP is typically responsible for the entirety or portions of a businesses IT infrastructure as agreed upon in a Service Level Agreement (SLA). Some of the services provided via the SLA include security patching, performance monitoring, and application troubleshooting. With this managed service, the client usually provides and/or procures the equipment to be managed with or without guidance from the MSP. More information can be found at ConnectWise.

Monthly system and network monitoring includes security patching, performance monitoring, software and firmware updates, local backups (if possible), as well as simple operating system troubleshooting.

If Confident Cyber Tech Solutions (CCTS) is hosting your website, we typically host using Amazon Web Services (AWS). Dependent on customer wishes we will host their site in the region(s) requested to ensure greatest response times. Additionally, for testing purposes some websites may be hosted using Digital Ocean.

PRIVACY POLICY

WHO WE ARE

Confidentcyber.org is owned by Confident Cyber Tech Solutions, LLC. We are located in the United States and can be contacted through email HERE.

INFORMATION WE MAY COLLECT
COMMENTS

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here. After approval of your comment, your profile picture is visible to the public in the context of your comment.


MEDIA

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the webs.


CONTACT FORMS

We use contact forms to gather information to better serve you and meet your needs. The information collected in our contact form is contained on a third-party customer relations management site and will be held confidential. If a need arises where information is needed to be shared written permission will be requested from either party with the details of the purpose of the request.

Privacy Policy
REQUEST FOR INFORMATION COLLECTED
YOUR RIGHTS OVER YOUR DATA

If you have an account on this site or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

To request this information please use the above contact form.

COOKIES

If you leave a comment on our site you may opt-in to saving your name, email address, and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.
If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.


When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.


If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

EMBEDDED CONTENT FROM OTHER SITES

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the same way as if the visitor has visited the other website.
These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

ANALYTICS

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in the moderation queue.
For users that register on our website, we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

Visitor comments may be checked through an automated spam detection service.