top of page

Cyber Security Simplified

SMALL changes.

MONUMENTAL  Results. 

It only takes clicking on one compromised link to ruin a company.

Are you the weakest link?

assess.png

Get Scored

Using proprietary tools to scour the web, TCL finds exposures and information about your company already known online.  Curious if assets like your usernames and passwords are for sale on the dark web? TCL provides a cybersecurity scorecard; a report on key aspects of your security profile.

phish envelope.png

Get Phished

TCL safely phishes your employees’ emails to gauge how many are likely to get caught in scams which often lead to wire transfer fraud, compromised accounts, and serious financial and asset loss. Phishing is the top way ransomware spreads, and 90% of incidences and breaches involve this attack. TCL provides a detailed report of your team’s responses. Currently, 40-60% of all companies we test fall prey to our simple initial phishing test.

educate.png

Get Trained

Changing the behaviors of your people is the key to improving cybersecurity. Our approach doesn’t stop at raising employee security awareness like other companies. We draw on your Scoring and Phishing results to deliver a bespoke training program focusing on actionable items and immediately impacting your risk exposures.

The Cyber List, Cybersecurity threats, cyber threats, cybersecurity attacks, cyber attacks, cyber business attacks, the cyber list, cyrptoransomeware, protect your company from cyber attacks, cyber security train your team,  The cyber list is a cyber security training company, phishing your company, phishing your team, phish your company. Phish your team. 

73%

73%

were financially motivated.

90%

90%

of incidences and breaches included a phishing element.

81%

81%

of hacking-related breaches leveraged either stolen and/or weak passwords.

Introducing The CyberList™

Introducing The CyberList™

Search video...

Get Phished - subtitled

00:00
Play Video
Why The Cyber List is the right choice for you

Why The Cyber List is the right choice for you

01:29
Play Video
Water-holing

Water-holing

01:12
Play Video
Ransomware

Ransomware

02:08
Play Video
Derek Harp Testimonials

Derek Harp Testimonials

02:59
Play Video
Internet of Things

Internet of Things

01:34
Play Video
Derek Harp

Derek Harp

01:11
Play Video
Cyber Security Threats That Can Destroy Your Business | Derek Harp | Episode #576

Cyber Security Threats That Can Destroy Your Business | Derek Harp | Episode #576

42:49
Play Video
WHAT PEOPLE ARE SAYING

"The Cyber List is a resource created to help us navigate through these cyber issues. We don't really understand them. We don't really want to understand them. But I now know that we NEED to understand them. I was looking for someone to hold my hand and humor me. To give me that spoonful of sugar, so that I could tolerate all this stuff to help me do what we needed to protect our company. I'm so grateful to have found Derek and The Cyber List."

seta.png
Lesli S., Partner
Speed, Seta, Martin, Trivett & Stubley

"Cybersecurity can be a very dry topic for a lot of folks. They don't find it very engaging, and it's difficult to relate to.  It's hard to draw people into a real conversation and engage them about this very real and important topic.

Derek does a wonderful job bringing energy, enthusiasm, and humor to the conversation that draws his audience in and makes the content accessible in a way that also makes it meaningful for them. Participants in Derek's workshop walk away with tangible advice. They get the message loud and clear and understand how to improve their cybersecurity."

hanno.png
Hanno E., CEO
Idenhaus
TESTIMONIALS
Ready to take that first step toward securing yourself and your company?

We are ready to assist. Contact us by email, contact form or our social channels below.

bottom of page