threeshield.ca Open in urlscan Pro
2606:4700:20::681a:a50  Public Scan

Submitted URL: https://accountantshield.com/
Effective URL: https://threeshield.ca/
Submission: On July 14 via automatic, source certstream-suspicious — Scanned from NL

Form analysis 4 forms found in the DOM

<form id="startform">
  <input name="g-recaptcha-response" data-lpignore="true" id="g-recaptcha-response" type="hidden" tabindex="0"
    value="03AFcWeA5TH6LOUKBW9wex_YPgaNdVlIGDyitwMWSVK3QJeNVzxuKk8unDMTHSe6Gz6LN6roexVV_Nwaf-MBoKBnjcjqVErMcVo5WXw96XKp9CfVBbPp1vXXlf8PlYc2h4yoP43KWmFXlXGMTZTmPsOFV4VFjjV1f4PADb7dKZIj1P50uiK96cs_4nszNrJXS5U-bDbJ37_7L4-ciJRxSX2AdmKD3ZHdwkRVhk8IjK5qPIfPUewAdzh8hH5qXmaDwh8eKuE-mwzozZJTn69KwYxKJcl4VNhr4HiLbBruIRzx0S0o-4ZOT1N0F8lvBy7Eo2rvnOAN23tSKuzGQ2BHvf2cDMQua0rNAvsJG_NLw9jMrFYs3PsiLVToPUYMduck-Zu5-hV_VheeDEVEyg2Zk2Gxx9DhBhbWtiyXdHq-ooe5X2rUguxBedZXGyBhmLYykxNea6EAcwtRdDC7-OsblwdtGEfw38bItsRt-fpsZJas5IgOVS3kMIH0hoYmG_iuqSHQhCJXLCBNhy_e4WS3h7gPSsMHuSkHjShHUv0Zd4lq2Q3XVgLIn58-IiEozt-smHv5cyH0abDeRg-u62y3Nd6f9nwlycp5ZEbYpAqJzqw-JGsSIw6ptU78AJsMfDoKL42FmfZvXEdQ8Tagb5lZVERgmN5g9botAL_o_1Gra-UtY6twVFMzARDno">
  <input name="CSRF" id="CSRF" value="" type="hidden">
  <div class="grid grid-cols-1">
    <div class="mb-5">
      <div class="form-icon relative mt-2">
        <svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"
          class="feather feather-user w-4 h-4 absolute top-3 ltr:left-4 rtl:right-4">
          <path d="M20 21v-2a4 4 0 0 0-4-4H8a4 4 0 0 0-4 4v2"></path>
          <circle cx="12" cy="7" r="4"></circle>
        </svg>
        <input maxlength="254" onblur="initialvalidate();" type="text" id="clientname" name="name" onkeyup="initialvalidate();" value="Validating Security. Please wait..." class="form-input ltr:pl-12 rtl:pr-12" placeholder="Name" disabled=""
          required="">
        <div id="nametip"></div>
      </div>
    </div>
    <div class="mb-5">
      <div class="form-icon relative mt-2">
        <svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"
          class="feather feather-mail w-4 h-4 absolute top-3 ltr:left-4 rtl:right-4">
          <path d="M4 4h16c1.1 0 2 .9 2 2v12c0 1.1-.9 2-2 2H4c-1.1 0-2-.9-2-2V6c0-1.1.9-2 2-2z"></path>
          <polyline points="22,6 12,13 2,6"></polyline>
        </svg>
        <input maxlength="254" value="Validating Security. Please wait..." onblur="initialvalidate();" onkeyup="initialvalidate();" type="email" id="clientemail" name="email" minlength="7" class="form-input ltr:pl-12 rtl:pr-12" placeholder="Email"
          disabled="" required="">
        <div id="emailtip">
        </div>
      </div>
    </div>
    <div class="mb-5">
      <div class="form-icon relative mt-2">
        <svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"
          class="feather feather-phone w-4 h-4 absolute top-3 ltr:left-4 rtl:right-4">
          <path
            d="M22 16.92v3a2 2 0 0 1-2.18 2 19.79 19.79 0 0 1-8.63-3.07 19.5 19.5 0 0 1-6-6 19.79 19.79 0 0 1-3.07-8.67A2 2 0 0 1 4.11 2h3a2 2 0 0 1 2 1.72 12.84 12.84 0 0 0 .7 2.81 2 2 0 0 1-.45 2.11L8.09 9.91a16 16 0 0 0 6 6l1.27-1.27a2 2 0 0 1 2.11-.45 12.84 12.84 0 0 0 2.81.7A2 2 0 0 1 22 16.92z">
          </path>
        </svg>
        <input maxlength="254" value="Validating Security. Please wait..." onblur="initialvalidate();" onkeyup="initialvalidate();" type="tel" id="clientphone" name="phone" class="form-input ltr:pl-12 rtl:pr-12" placeholder="403-123-4567" required=""
          disabled="">
        <div id="phonetip"></div>
      </div>
    </div>
    <div class="mb-5">
      <div class="form-icon relative mt-2">
        <svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"
          class="feather feather-target w-4 h-4 absolute top-3 ltr:left-4 rtl:right-4">
          <circle cx="12" cy="12" r="10"></circle>
          <circle cx="12" cy="12" r="6"></circle>
          <circle cx="12" cy="12" r="2"></circle>
        </svg>
        <select id="purpose" name="purpose" required="" class="form-input ltr:pl-12 rtl:pr-12">
          <option value="No Selected Goal">Your Goal...</option>
          <option value="Cybersecurity or compliance Question">Answer cybsecurity / compliance questions or concerns</option>
          <option value="Secure my Business">Secure my new business</option>
          <option value="Supplement existing IT">Supplement existing IT</option>
          <option value="Comprehensive IT and Security">Comprehensive IT and cybersecurity</option>
          <option value="Assessment or Pen Test">Assessment / Pen Test</option>
          <option value="Breach Response">Respond to breach</option>
          <option value="configure and monitor">Securely configure &amp; monitor existing systems &amp; services</option>
          <option value="Gap Assessment">Gap Assessment</option>
          <option value="Compliance">Compliance with PCI, NERC CIP, PIPA, HIA, GDPR, etc.</option>
          <option value="Code Security">Development and Code Security </option>
          <option value="DMARC automation">DMARC automation</option>
          <option value="Careers">Work with ThreeShield</option>
          <option value="Internship">Internship</option>
          <option value="Media Inquiry">Media Inquiry</option>
          <option value="Expert Witness">Expert Witness</option>
          <option value="MSP Partner">Become an MSP Partner</option>
          <option value="vendor">Sell to ThreeShield</option>
          <option value="Bug Bounty">Bug Bounty</option>
          <option value="Free Training">Free Security Awareness Training for schools and community groups</option>
        </select>
      </div>
    </div>
    <div id="reCAPTCHAfollowup"></div>
  </div>
</form>

<form class="mb-0">
  <div>
    <label class="form-label font-medium">Number of Users: </label>
    <div class="form-icon relative mt-2">
      <svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"
        class="feather feather-users w-4 h-4 absolute top-3 ltr:left-4 rtl:right-4">
        <path d="M17 21v-2a4 4 0 0 0-4-4H5a4 4 0 0 0-4 4v2"></path>
        <circle cx="9" cy="7" r="4"></circle>
        <path d="M23 21v-2a4 4 0 0 0-3-3.87"></path>
        <path d="M16 3.13a4 4 0 0 1 0 7.75"></path>
      </svg>
      <input type="number" min="0" value="0" class="form-input ltr:pl-12 rtl:pr-12" placeholder="Users:" id="users" name="users">
    </div>
  </div>
  <div>
    <label class="form-label font-medium">Number of servers/instances: </label>
    <div class="form-icon relative mt-2">
      <svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"
        class="feather feather-server w-4 h-4 absolute top-3 ltr:left-4 rtl:right-4">
        <rect x="2" y="2" width="20" height="8" rx="2" ry="2"></rect>
        <rect x="2" y="14" width="20" height="8" rx="2" ry="2"></rect>
        <line x1="6" y1="6" x2="6.01" y2="6"></line>
        <line x1="6" y1="18" x2="6.01" y2="18"></line>
      </svg>
      <input type="number" min="0" value="0" class="form-input ltr:pl-12 rtl:pr-12" placeholder="Servers:" id="servers" name="servers">
    </div>
  </div>
  <div>
    <label class="form-label font-medium">Number of workstations/endpoints: </label>
    <div class="form-icon relative mt-2">
      <svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"
        class="feather feather-monitor w-4 h-4 absolute top-3 ltr:left-4 rtl:right-4">
        <rect x="2" y="3" width="20" height="14" rx="2" ry="2"></rect>
        <line x1="8" y1="21" x2="16" y2="21"></line>
        <line x1="12" y1="17" x2="12" y2="21"></line>
      </svg>
      <input type="number" min="0" value="0" class="form-input ltr:pl-12 rtl:pr-12" placeholder="Desktops:" id="desktops" name="desktops">
    </div>
  </div>
  <div id="creditcarddetails" style="display:none;">
    <label class="form-label font-medium">How do you accept credit cards?</label>
    <div class="form-check form-switch">
      <input class="form-check-input" type="checkbox" id="PCIA">
      <label class="form-check-label" for="PCIweb" style="text-transform:none">Website</label>
    </div>
    <div class="form-check form-switch">
      <input class="form-check-input" type="checkbox" id="PCIB">
      <label class="form-check-label" for="PCIB" style="text-transform:none">Credit card terminal(s)</label>
    </div>
    <div class="form-check form-switch">
      <input class="form-check-input" type="checkbox" id="PCICVT">
      <label class="form-check-label" for="PCICVT" style="text-transform:none">Virtual Terminal</label>
    </div>
    <div class="form-check form-switch">
      <input class="form-check-input" type="checkbox" id="PCIphoneother">
      <label class="form-check-label" for="PCIphoneother" style="text-transform:none">Phone/Other</label>
    </div>
    <div class="form-check form-switch">
      <input class="form-check-input" type="checkbox" id="PCID">
      <label class="form-check-label" for="PCID" style="text-transform:none">We store credit card numbers</label>
    </div>
  </div>
  <div>
    <input type="button" id="button3" onclick="submitform3();" class="btn bg-indigo-600 hover:bg-indigo-700 border-indigo-600 hover:border-indigo-700 text-white rounded-md w-full" value="Final thoughts&nbsp;&nbsp;•&nbsp;➤">
  </div>
</form>

<form class="mb-0">
  <div class="grid grid-cols-1">
    <div class="mt-5">
      <div class="form-icon relative mt-2">
        <svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"
          class="feather feather-message-circle w-4 h-4 absolute top-3 ltr:left-4 rtl:right-4">
          <path d="M21 11.5a8.38 8.38 0 0 1-.9 3.8 8.5 8.5 0 0 1-7.6 4.7 8.38 8.38 0 0 1-3.8-.9L3 21l1.9-5.7a8.38 8.38 0 0 1-.9-3.8 8.5 8.5 0 0 1 4.7-7.6 8.38 8.38 0 0 1 3.8-.9h.5a8.48 8.48 0 0 1 8 8v.5z"></path>
        </svg>
        <textarea name="questions" id="questions" class="form-input ltr:pl-11 rtl:pr-11 h-28" placeholder="Questions or Concerns"></textarea>
      </div>
    </div>
  </div>
  <div>
    <div class="grid grid-cols-1">
      <div class="mt-5">
        <div class="form-icon relative mt-2">
          <svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"
            class="feather feather-link w-4 h-4 absolute top-3 ltr:left-4 rtl:right-4">
            <path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71"></path>
            <path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71"></path>
          </svg>
          <textarea name="websites" id="websites" class="form-input ltr:pl-11 rtl:pr-11 h-28" placeholder="Your website(s)"></textarea>
        </div>
      </div>
    </div>
  </div>
  <div>
    <div class="grid grid-cols-1">
      <div class="mt-5">
        <div class="form-icon relative mt-2">
          <svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"
            class="feather feather-mail w-4 h-4 absolute top-3 ltr:left-4 rtl:right-4">
            <path d="M4 4h16c1.1 0 2 .9 2 2v12c0 1.1-.9 2-2 2H4c-1.1 0-2-.9-2-2V6c0-1.1.9-2 2-2z"></path>
            <polyline points="22,6 12,13 2,6"></polyline>
          </svg>
          <textarea name="legal" id="legal" class="form-input ltr:pl-11 rtl:pr-11 h-28" placeholder="Legal name and addres for agreements"></textarea>
        </div>
      </div>
    </div>
  </div>
  <div>
    <input type="button" id="button4" onclick="submitform4();" class="btn bg-indigo-600 hover:bg-indigo-700 border-indigo-600 hover:border-indigo-700 text-white rounded-md w-full" value="Please contact me">
  </div>
</form>

<form class="mb-0">
  <div>
    <label class="form-label font-medium">LinkedIn Profile: </label>
    <div class="form-icon relative mt-2">
      <svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"
        class="feather feather-linkedin w-4 h-4 absolute top-3 ltr:left-4 rtl:right-4">
        <path d="M16 8a6 6 0 0 1 6 6v7h-4v-7a2 2 0 0 0-2-2 2 2 0 0 0-2 2v7h-4v-7a6 6 0 0 1 6-6z"></path>
        <rect x="2" y="9" width="4" height="12"></rect>
        <circle cx="4" cy="4" r="2"></circle>
      </svg>
      <input type="text" class="form-input ltr:pl-12 rtl:pr-12" placeholder="https://ca.linkedin.com/in/yourname" id="linkedin" name="linkedin">
    </div>
  </div>
  <label class="form-label font-medium"><br>Please check your knowledge area(s): </label>
  <div class="flex justify-between pb-4">
    <h6 class="mb-0 font-medium">AWS and network infrastructure</h6>
    <div class="form-check">
      <input class="form-check-input" type="checkbox" value="yes" id="AWS">
      <label class="form-check-label" for="AWS"></label>
    </div>
  </div>
  <div class="flex justify-between py-2 border-t border-gray-100 dark:border-gray-700">
    <h6 class="mb-0 font-medium">M365 and Azure AD</h6>
    <div class="form-check">
      <input class="form-check-input" type="checkbox" value="yes" id="M365">
      <label class="form-check-label" for="M365"></label>
    </div>
  </div>
  <div class="flex justify-between py-2 border-t border-gray-100 dark:border-gray-700">
    <h6 class="mb-0 font-medium">PHP, JavaScript, and SQL</h6>
    <div class="form-check">
      <input class="form-check-input" type="checkbox" value="yes" id="PHP">
      <label class="form-check-label" for="PHP"></label>
    </div>
  </div>
  <div class="flex justify-between py-2 border-t border-gray-100 dark:border-gray-700">
    <h6 class="mb-0 font-medium">Rust or Flutter</h6>
    <div class="form-check">
      <input class="form-check-input" type="checkbox" value="yes" id="rust">
      <label class="form-check-label" for="rust"></label>
    </div>
  </div>
  <div class="mt-5">
    <div class="form-icon relative mt-2">
      <svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"
        class="feather feather-message-circle w-4 h-4 absolute top-3 ltr:left-4 rtl:right-4">
        <path d="M21 11.5a8.38 8.38 0 0 1-.9 3.8 8.5 8.5 0 0 1-7.6 4.7 8.38 8.38 0 0 1-3.8-.9L3 21l1.9-5.7a8.38 8.38 0 0 1-.9-3.8 8.5 8.5 0 0 1 4.7-7.6 8.38 8.38 0 0 1 3.8-.9h.5a8.48 8.48 0 0 1 8 8v.5z"></path>
      </svg>
      <textarea name="carquestions" id="carquestions" class="form-input ltr:pl-11 rtl:pr-11 h-28" placeholder="Summary of your ideal job and how to reach you"></textarea>
    </div>
  </div>
  <div>
    <input type="button" id="button4" onclick="submitform4career();" class="btn bg-indigo-600 hover:bg-indigo-700 border-indigo-600 hover:border-indigo-700 text-white rounded-md w-full" value="Please contact me">
  </div>
</form>

Text Content

 * 
 * 

 * Holistic IT
   * About ThreeShield
   * Calgary Cyber Security
   * Calgary IT Support
   * Holistic IT vs “Managed” IT
   * Boost your IT Department
   * Backup & Business Continuity
   * Security Awareness Training
   * Code Review
   * Audit Preparation
 * Solutions
   * For IT Pros
     * Level 3 Support
     * Code Review
     * OWASP, PCI, & PII Training
     * Backup & Business Continuity
       
     
   * Audit / Compliance
     * Audit Preparation
     * NERC-CIP
     * Code Review
       
 * Info
   * How to...
     * 2024 DMARC requirements
     * MFA for Cloud Services
     * Extensions to Quarantine
   * IT Insights
     * Hidden Appliance Vulnerabilities
   * News & Breaches
     * EasyXDM Vulnerabilities
     * ESXiArgs VMware Ransomware Feb 2023
     * OneNote Phishing 2023
     * December 2022 LastPass Breach
     * ABTraceTogether Cybersecurity & Privacy
     * Were you caught watching porn or using LinkedIn?
   * COVID-19
     * COVID-19 Business Continuity
     * ABTraceTogether Cybersecurity & Privacy
   * Phishing
     * Encrypted Email Phishing
     * File Sharing Hacking & Phishing
     * Were you caught watching porn or using LinkedIn?
   * Emergency IT Support
   * Blog
   * ThreeShield Careers
   

Supporting growing businesses so you can thrive with comprehensive,
compliance-focused cybersecurity and IT Support:



  IT Staff Support   Augment IT  |  Find Gaps  |  Monitor & configure

  Management Confidence    Managed IT Security  |  Business IT Support  | 
Compliance  |  IT Audit  |  Comprehensive IT  |  Startup
Ransomware  |  Cybersecurity Insurance Questionnaires

  DevOps, SRE, SOC   Code Security Review  |  Independent IT Audit  |  L3



CONGRATULATIONS ON YOUR NEW BUSINESS!

We look forward to hearing about your new endeavour so we can work together to:
 * Design your websites and apps securely to prevent costly fixes
 * Reduce your credit card fees and avoid PCI (Payment Card Industry) fines
 * Ensure compliance with privacy and industry requirements
 * Prevent breaches to your Microsoft, Google, AWS, and other services
 * Keep your internal network fast, accessible, and secure
 * Prepare for insurance, bank, vendor, client, and PCI questionnaires/audits
 * Prevent well-meaning employees from accidentally infecting your company
 * Prepare for outages and breaches so you can work on building your business

GET BACK TO BUSINESS WITHOUT CONSTANT IT FIRES

An IT support technician can't manage your IT by themselves. You need sound
business-focused IT strategies and a holistic view that includes your
business-critical tools, protection from hackers, day-to-day operations, and
prevention to transform IT from an area of constant problems and outages to one
that can give you a competitive advantage!
 * Add reliability to prevent IT emergencies
 * IT security awareness training to make employees more resilient
 * Regular monitoring to prevent potential breaches and problems from spiralling
   out of control
 * Maintain compliance and minimize the impact of disasters through
   comprehensive backups, redundancy, and business continuity
 * Comprehensive system management from workstation to servers and cloud
 * Supplement existing IT with comprehensive, strategic IT and security
   management
 * Holistic IT management grounded in cybersecurity certifications and
   experience from small business to government to Fortune 50

CYBERSECURITY AND INSURANCE QUESTIONNAIRES

Questionnaires from insurance, banks, clients, and vendors can be overwhelming.
Our comprehensive approach to information security controls make these a breeze.
 * If you're an existing client, you likely have everything they want so we can
   quickly prioritize missing pieces and fill in the questionnaire for you.
 * If this questionnaire is why you're reaching out to us, we can fast-track
   your implementations, include the questionnaire in your organizational
   requirements, quickly complete the form, and wind up with more reliable IT as
   a side benefit.
 * If your credit card processor wants you to fill out a PCI (Payment Card
   Industry) SAQ (Self-Assessment Questionnaire), we can likely reduce your
   compliance burden and quickly implement the controls they want to see for SAQ
   A, A-EP, B, B-IP, C, C-VT, or D using our proven drop-in PCI compliance.

PREVENT AND RECOVER FROM RANSOMWARE

Ransomware protection needs to come in many layers: we prevent the bad guys from
coming in, isolate them if they do, provide an easy way to recover any damaged
files, and make it easy for you to qualify for cybersecurity insurance.
This multi-pronged approach covers you in the worst-case -- while minimizing the
likelihood of that happening. Our Ransomware Defense package includes:
 * Internet, workstation, and cloud service firewall monitoring and
   configuration
 * Breach detection, endpoint detection and response, antivirus, wireless, and
   firewall configurations that isolate infected computers
 * Canadian backups for Microsoft 365 (including Teams, email, OneDrive,
   SharePoint, calendars), Google Workspace, workstations, web servers,
   WordPress, AWS, and firewalls
 * Patching for Windows, Mac, Linux, and network equipment for applications and
   operating systems
 * Website (including WordPress) protection
 * Microsoft 365, Google Workspace, Internet firewall, and workstation breach
   and attack monitoring
 * Comprehensive information security controls, including policies that cyber
   insurance policies require

CHECK IT BEFORE YOU SHIP IT

We use a combination of automated code review and library management with
well-honed manual code reviews and functional testing to improve your product
quality, reduce bug bounties, and improve your reputation.

WE DON'T HAVE L1 SUPPORT

When you call or email us, you'll get an experienced expert with a diploma or
degree supplemented with certification(s) in cybersecurity and extensive
experience. We're happy to help set up your printer. However, you can also use
us as your Tier 2 and 3 support levels. In addition to coming to ThreeShield
well-qualified, we continually invest in training our team to extend their
cybersecurity, AWS, and Microsoft 365 skills.

ONE CALL TO GO FROM OVERSTRESSED TO HERO

Let's get you what you need to:
 * Add reliability so you can stop putting out fires
 * Cybersecurity analysis to give you more time
 * Know your systems get checked every morning
 * Show management the benefits of your new proactive approach
 * Backup email, OneDrive, Google Workspace, workstations, servers, etc.
 * Review coding changes to avoid disaster
 * Topical security updates that you can send out to staff
 * Advanced security insights, such as fake virus notices and external email
   spoofing

Read More

SHOW YOU KNOW WHAT TO DO.

Do you need the support of an independent audit to get management to approve
doing the right thing? Our methodology covers your compliance and custom scope
requirements while providing freedom to experienced, certified auditors with
government and Fortune 50 experience to do a deep-dive into your systems,
Microsoft, Google, AWS, and other service provider configurations.
 * Compliance audits: PCI (credit cards), NERC-CIP, Alberta and BC Health
 * IT and Privacy regulations for Canada, United States, Europe, Australia...
 * Best practices, deep-dive, or standards-based

INDEPENDENT SET OF EYES ON YOUR IT

From independent auditor assessments to find and fix engagements, ThreeShield
will provide an unbiased and actionable review of your environment. Unlike Big4
accounting firms, your audit team will exclusively consist of experienced
security professionals led by a Certified Information Systems Auditor with
extensive government and Fortune 50 audit experience following a methodology
that allows for a deeper dive than you've ever experienced before. This approach
means that we often provide over 200 findings when other firms found fewer than
five the year before.
 * Comprehensive control reviews, penetration tests, insurance questionnairess
 * Compliance audits: PCI (credit cards), NERC, Alberta and BC Health
 * IT and Privacy regulations for Canada, United States, Europe, Australia...
 * Best practices, deep-dive, or standards-based
 * One-off assessment, follow-up, or ongoing IT controls monitoring
 * Preparation and/or pre-audit to ensure success.

FAST TRACK SUSTAINABLE COMPLIANCE

Save money by reducing your compliance burden, using a proven set of tools,
policies, and monitoring to quickly achieve compliance and stay compliant.
 * PCI-DSS (credit cards)and NERC-CIP
 * IT and Privacy regulations for Canada, United States, Europe, Australia...
 * Alberta and BC Health compliance

TOO BUSY PUTTING OUT FIRES TO PREVENT THEM?

You're a call away from being a relaxed hero! Let's get you what you need to:
 * Windows, Linux, Mac, Firewalls, AV, EDR
 * AWS, M365, Google
 * Endpoint configurations and user-focused protection
 * Security Awareness Training, Phishing Simulations
 * Backup for email, OneDrive, Google Workspace, workstations, servers
 * DMARC (email spoofing)
 * Chrome and Edge risks like notification popups and extensions


Tell us what keeps you up at night:
Calgary: (403) 538-5053
Vancouver: (778) 731-1339
Toronto: (289) 724-8829
Toll-free: (877)528-2925

Cybersecurity Careers
×

LET'S EXPLORE SOLUTIONS!

Your Goal... Answer cybsecurity / compliance questions or concerns Secure my new
business Supplement existing IT Comprehensive IT and cybersecurity Assessment /
Pen Test Respond to breach Securely configure & monitor existing systems &
services Gap Assessment Compliance with PCI, NERC CIP, PIPA, HIA, GDPR, etc.
Development and Code Security DMARC automation Work with ThreeShield Internship
Media Inquiry Expert Witness Become an MSP Partner Sell to ThreeShield Bug
Bounty Free Security Awareness Training for schools and community groups

We only accept communications through this web form from Canada.
To reach us from outside of Canada, please call our Calgary phone number:
+1 (403) 538-5053

Feel free to chat with us during business hours or call one of the following
numbers to get started:



Alberta: 1 (403) 538-5053 BC: 1 (778) 731-1339 Ontario: 1 (289) 724-8829
Canada: 1 (877) 528-2925 California: 1 (510) 214-6010

WHAT ARE YOUR PRIORITIES?

COMPREHENSIVE IT ASSESSMENT



SECURE/MANAGE IT SYSTEMS



WEB/INTERNET ASSESSMENT



FILL IT GAPS



REVIEW OR DESIGN SECURE CODE



SECURITY AWARENESS TRAINING



PCI CREDIT CARD COMPLIANCE



HEALTH AND PRIVACY COMPLIANCE



NERC OR PIPELINE COMPLIANCE



BACKUP / DISASTER RECOVERY



GOOGLE / M365 SECURITY



Number of Users:

Number of servers/instances:

Number of workstations/endpoints:

How do you accept credit cards?
Website
Credit card terminal(s)
Virtual Terminal
Phone/Other
We store credit card numbers


Please watch this short video before applying for your first job in
cybersecurity:
LinkedIn Profile:


Please check your knowledge area(s):

AWS AND NETWORK INFRASTRUCTURE



M365 AND AZURE AD



PHP, JAVASCRIPT, AND SQL



RUST OR FLUTTER




Thank you for reaching out.

Typically, we're able to respond the same or next business day.

CYBERSECURITY FIRST • CUSTOMIZED FOR YOU


BALANCED & HOLISTIC APPROACH TO PROACTIVE IT

We get it: even the best system administrators can't fix all of your computer
issues, deal with the cloud, stay on top of PCI and privacy compliance, stay
abreast of emerging cybersecurity threats, and plan to reduce all of the
problems they're solving.

Even with a team of developers, IT support staff, and outsourced “IT service”
providers, you need proactive and holistic information technology and
information security assessment, management, and tier-three support so you can
stop having to react to IT problems, outages, and attacks.

We can even provide local remote and on-site Toronto, Vancouver, and Calgary IT
Support.
Read More

Assesment & Controls

Focused PCI, NERC, insurance, health, and privacy audits to in-depth customized
comprehensive control assessments using our proven processes, proprietary tools,
government and Fortune 50 audit experience, and advanced cybersecurity control
certifications.

Get Started
Instant Proactive IT Team

Whether your current “IT Department” is the founder who hands out laptops, a
reactive outsourced IT company, or group of desktop support experts, ThreeShield
will fill in the gaps to proactively increase reliability and support your
current IT and non-IT staff with experienced IT and Information Security
experts.

Get Started
Securely Configure & Monitor

Anyone can install a server or wireless network; turn on a laptop; fill in a
website template; or sign up for an AWS, Google Workspace, or Microsoft 365
account. However, it takes experts to securely configure, maintain, and monitor
these systems to prevent outages and threats like ransomware.

Get Started

EXPERIENCE WITH ACCOUNTING, AEROSPACE, FINTECH, GOVERNMENT, HEALTHCARE, LAW, OIL
& GAS, RETAIL, STARTUPS, AND OTHER SECTORS


SOME OF THREESHIELD'S CLIENTS

ThreeShield Information Security has provided customized IT security tools and
consulting to organizations of all sizes, including the following:
1-Page •  ACE Project Marketing •  Affirm Chartered Accountants •  Alberta 2030
Commonwealth Games •  Avenge Energy Services Inc. •  Calgary Foothills Primary
Care Network •  Carrier Corporation •  Centre for Affordable Water and Snitation
Technology •  Cigar Place •  Citadel Drilling •  Collins Barrow Calgary LLP • 
Commodity Trading Firms (confidential) •  Computer Sciences Corporation • 
Deloitte •  Ear Candy •  Ernst & Young •  Encompass Medical Experts •  Escape
Ops •  Financial advisors •  Fintech companies (confidential) •  First Gulf
Bank •  Government of Alberta •  Hamilton Sundstrand Corporation •  Hurricane
Computer Solutions •  IntelliView Technologies •  International Aero Engines • 
I.T. Connex •  KPMG •  Linden Research (Linden Lab) •  Magtec •  Marda Loop
Braces •  MTA Urban Design Architecture Interior Design •  NASA •  NORESCO • 
Otis Elevator Company •  Party Enterprises •  Plateau Systems •  Pratt &
Whitney •  Precious metals (confidential) •  Red Link SA (Argentina) • 
Segurança da Informação e Conformidade •  Sikorsky Aircraft Corporation •  Strut
Creative •  Tech Fuel •  Tilia Inc •  TOOT'n TOTUM •  Towers Watson •  United
Technologies Corporation •  Universidade de São Paulo •  UTC Power •  Wealth 'N
tax •  Whitecap Resources Inc •  YR Plans
What our clients think about our holistic security-first and business-focused
approach:
Vince

Non-profit

Chris at ThreeShield provided really great expertise around our online security
needs. His process walked us through a full review in a fun and informative way
and then offered practical prioritized recommendations to empower us to boost
our productivity and enhance our security without it being too big of a hassle.
Chris and his team took us beyond just changing settings. They educated us with
valuable tips and tricks that allowed us to evolve and better understand our
needs and our audience. The simple changes improved our reliability and reduced
risks that were baked into our old process and default web hosting settings. I'd
recommend Chris and his team to anyone who knows they need help, or us unsure of
what help they need. ThreeShield will take care of you.

 * 
 * 
 * 
 * 
 * 

Scott

CTO, Tilia Inc. (Financial Technology and Online Payments)

As the Chief Compliance Officer of a payments entity, I have relied on
ThreeShield Information Security to provide risk-based solutions that have
satisfied regulators and business partners alike. While our Money Services
Business is unique in that it supports commerce within virtual worlds and video
game environments, the security standards that we have to meet are the same as
they would be for any regulated financial institution.
ThreeShield has employed a dynamic, risk-based approach to information security
that is specific to our business needs but also provides comfort to our external
stakeholders.
I recommend their services.

 * 
 * 
 * 
 * 
 * 

Debbi

Director of Customer Support

Chris [of ThreeShield] was keen on building partnerships of understanding with
key stakeholders, and made the effort to understand the needs of the customer
support team in terms of information, and balance those with the regulatory
concerns -- both in specific and in general -- over PII, data storage and
transmission, etc. It is this proactive approach that ensured that we had an
open line of communication with Chris, and made me feel confident that when
reaching out to him with a question or concern would net me a direct and
actionable response.

 * 
 * 
 * 
 * 
 * 

Noelle

IT Architect, Financial Technology and Online Retail

Collaborating with ThreeShield to ensure data security was an exciting and
educational experience. As we exploded in growth, it was clear that we needed to
rapidly mature on all fronts, and ThreeShield was integral to building our
confidence with information, software, and infrastructure security.

 * 
 * 
 * 
 * 
 * 

Matt

Sales Enablement Lead, Precious Metals

ThreeShield is a really good company to work with. They have a great blend of
security and efficiency, making sure that you are 100% secure, but not at the
expense of your productivity. 10/10 would use them again.

 * 
 * 
 * 
 * 
 * 

Tara

Senior Director of Systems and Build Engineering

ThreeShield very much values active and respectful collaboration, and went out
of their way to get feedback on policies to make sure proposals balanced
business needs while not making employees feel like they were dealing with
unreasonable overhead. By doing so ThreeShield really helped change the culture
around security mindfulness is positive ways.

 * 
 * 
 * 
 * 
 * 

Chris B.

IT Analyst, Oil & Gas

Awesome company, great people to interact with, smart, quick responding, and
reasonably priced too.

 * 
 * 
 * 
 * 
 * 

Brian

IT Security Director, Linden Lab (Virtual Reality)

ThreeShield helped us focus our efforts, enhancing our security posture and
verifying PCI compliance.

All of this was achieved with minimal disruption to the engineering organization
as a whole.

The approach was smart. In a short time, we accomplished what much larger
companies still struggle to achieve.

 * 
 * 
 * 
 * 
 * 

Moe

Senior Trading Lead, Precious Metals

Great company to work with! Efficient, secure and always on the ball. Truly a
pleasure working alongside Chris & Tyson. Highly recommended.

 * 
 * 
 * 
 * 
 * 

Landon

VP Operations and Platform Engineering

Chris [of ThreeShield] possesses the rare skill in security professionals of
understanding broader business and technical demands and using that knowledge to
develop a balanced approach to security. He skillfully avoids the dogmatic,
prescriptive approach to security I've seen all too often and instead builds a
security plan that genuinely strengthens the business.

 * 
 * 
 * 
 * 
 * 

BLOG


INFORMATION TECHNOLOGY AND INFORMATION SECURITY NEWS
NEWS & BLOG

ThreeShield's clients receive security updates and proactive action to prevent
the items in our block from affecting them before these issues hit the news.
Our blog includes a subset of this information delayed after clients are already
protected. View full blog

CYBERSECURITY NEWS

EasyXDM Library 2.5.20 Vulnerabilities

27 March 2023

Cross-site scripting, redirection and other vulnerabilities that we discovered

Read More

CYBERSECURITY NEWS

ESXiArgs VMWare Ransomware

13 February 2023

Why ThreeShield's clients didn't get ESXiArgs ransomware and how you can prevent
it or recover from it.

Read More

PHISHING TRENDS

OneNote Phishing

2 February 2023

What do do about the increase in OneNote phishing. Includes attachment
extensions to quarantine.

Read More

ThreeShield Information Security Corporation is a Canadian federal corporation
with offices in Calgary, Alberta; Vancouver, BC;and Toronto, Ontario, Canada.

 * 
 *  
 *  
 *  

KEY PAGES

 * Home
 * About ThreeShield
 * Infosec Topics
 * Careers
 * Privacy Policy
 * MFA / 2FA
 * Bug Bounty
 * Site Map
 * Calgary IT Blog


AS SEEN ON...

 * BBB
 * CBC News
 * Global News

RECENT POSTS

 * 2024 DMARC Requirements
   29 January 2024
 * EasyXDM Library 2.5.20 Vulnerabilities
   27 March 2023
 * VMWare ESXiArgs Ransomware
   13 February 2023
 * Understaffed IT to Hero
   25 January 2023
 * Phishing through encrypted email services
   24 March 2021
 * File sharing hacking & phishing
   14 January 2021
 * COVID-19 Business Continuity & Cybersecurity
   3 March 2020
   

CONTACT US

 * AB: 1‑403‑538‑5053 
 * BC: 1‑778‑731‑1339 
 * ON: 1‑289‑724‑8829 
 * NW Calgary & Billing:
   (By Appointment Only)
   600 Crowfoot Crescent N.W., Suite 340
   Calgary, Alberta
   T3G 0B4
   
 * SE Calgary:
   (By Appointment Only)
   105, 11500‑29th St. SE
   Calgary, Alberta
   Canada
   T2Z 3W9

This site is protected by reCAPTCHA. The Google Privacy Policy and Terms of
Service apply.


Calgary photo courtesy of Lisa Bourgeault.



© 2006-2024 ThreeShield Information Security Corporation
and related companies: ThreeShield Information Security LLC (USA) and
ThreeShield Information Security LTD (UK)