threeshield.ca
Open in
urlscan Pro
2606:4700:20::681a:a50
Public Scan
Submitted URL: https://accountantshield.com/
Effective URL: https://threeshield.ca/
Submission: On July 14 via automatic, source certstream-suspicious — Scanned from NL
Effective URL: https://threeshield.ca/
Submission: On July 14 via automatic, source certstream-suspicious — Scanned from NL
Form analysis
4 forms found in the DOM<form id="startform">
<input name="g-recaptcha-response" data-lpignore="true" id="g-recaptcha-response" type="hidden" tabindex="0"
value="03AFcWeA5TH6LOUKBW9wex_YPgaNdVlIGDyitwMWSVK3QJeNVzxuKk8unDMTHSe6Gz6LN6roexVV_Nwaf-MBoKBnjcjqVErMcVo5WXw96XKp9CfVBbPp1vXXlf8PlYc2h4yoP43KWmFXlXGMTZTmPsOFV4VFjjV1f4PADb7dKZIj1P50uiK96cs_4nszNrJXS5U-bDbJ37_7L4-ciJRxSX2AdmKD3ZHdwkRVhk8IjK5qPIfPUewAdzh8hH5qXmaDwh8eKuE-mwzozZJTn69KwYxKJcl4VNhr4HiLbBruIRzx0S0o-4ZOT1N0F8lvBy7Eo2rvnOAN23tSKuzGQ2BHvf2cDMQua0rNAvsJG_NLw9jMrFYs3PsiLVToPUYMduck-Zu5-hV_VheeDEVEyg2Zk2Gxx9DhBhbWtiyXdHq-ooe5X2rUguxBedZXGyBhmLYykxNea6EAcwtRdDC7-OsblwdtGEfw38bItsRt-fpsZJas5IgOVS3kMIH0hoYmG_iuqSHQhCJXLCBNhy_e4WS3h7gPSsMHuSkHjShHUv0Zd4lq2Q3XVgLIn58-IiEozt-smHv5cyH0abDeRg-u62y3Nd6f9nwlycp5ZEbYpAqJzqw-JGsSIw6ptU78AJsMfDoKL42FmfZvXEdQ8Tagb5lZVERgmN5g9botAL_o_1Gra-UtY6twVFMzARDno">
<input name="CSRF" id="CSRF" value="" type="hidden">
<div class="grid grid-cols-1">
<div class="mb-5">
<div class="form-icon relative mt-2">
<svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"
class="feather feather-user w-4 h-4 absolute top-3 ltr:left-4 rtl:right-4">
<path d="M20 21v-2a4 4 0 0 0-4-4H8a4 4 0 0 0-4 4v2"></path>
<circle cx="12" cy="7" r="4"></circle>
</svg>
<input maxlength="254" onblur="initialvalidate();" type="text" id="clientname" name="name" onkeyup="initialvalidate();" value="Validating Security. Please wait..." class="form-input ltr:pl-12 rtl:pr-12" placeholder="Name" disabled=""
required="">
<div id="nametip"></div>
</div>
</div>
<div class="mb-5">
<div class="form-icon relative mt-2">
<svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"
class="feather feather-mail w-4 h-4 absolute top-3 ltr:left-4 rtl:right-4">
<path d="M4 4h16c1.1 0 2 .9 2 2v12c0 1.1-.9 2-2 2H4c-1.1 0-2-.9-2-2V6c0-1.1.9-2 2-2z"></path>
<polyline points="22,6 12,13 2,6"></polyline>
</svg>
<input maxlength="254" value="Validating Security. Please wait..." onblur="initialvalidate();" onkeyup="initialvalidate();" type="email" id="clientemail" name="email" minlength="7" class="form-input ltr:pl-12 rtl:pr-12" placeholder="Email"
disabled="" required="">
<div id="emailtip">
</div>
</div>
</div>
<div class="mb-5">
<div class="form-icon relative mt-2">
<svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"
class="feather feather-phone w-4 h-4 absolute top-3 ltr:left-4 rtl:right-4">
<path
d="M22 16.92v3a2 2 0 0 1-2.18 2 19.79 19.79 0 0 1-8.63-3.07 19.5 19.5 0 0 1-6-6 19.79 19.79 0 0 1-3.07-8.67A2 2 0 0 1 4.11 2h3a2 2 0 0 1 2 1.72 12.84 12.84 0 0 0 .7 2.81 2 2 0 0 1-.45 2.11L8.09 9.91a16 16 0 0 0 6 6l1.27-1.27a2 2 0 0 1 2.11-.45 12.84 12.84 0 0 0 2.81.7A2 2 0 0 1 22 16.92z">
</path>
</svg>
<input maxlength="254" value="Validating Security. Please wait..." onblur="initialvalidate();" onkeyup="initialvalidate();" type="tel" id="clientphone" name="phone" class="form-input ltr:pl-12 rtl:pr-12" placeholder="403-123-4567" required=""
disabled="">
<div id="phonetip"></div>
</div>
</div>
<div class="mb-5">
<div class="form-icon relative mt-2">
<svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"
class="feather feather-target w-4 h-4 absolute top-3 ltr:left-4 rtl:right-4">
<circle cx="12" cy="12" r="10"></circle>
<circle cx="12" cy="12" r="6"></circle>
<circle cx="12" cy="12" r="2"></circle>
</svg>
<select id="purpose" name="purpose" required="" class="form-input ltr:pl-12 rtl:pr-12">
<option value="No Selected Goal">Your Goal...</option>
<option value="Cybersecurity or compliance Question">Answer cybsecurity / compliance questions or concerns</option>
<option value="Secure my Business">Secure my new business</option>
<option value="Supplement existing IT">Supplement existing IT</option>
<option value="Comprehensive IT and Security">Comprehensive IT and cybersecurity</option>
<option value="Assessment or Pen Test">Assessment / Pen Test</option>
<option value="Breach Response">Respond to breach</option>
<option value="configure and monitor">Securely configure & monitor existing systems & services</option>
<option value="Gap Assessment">Gap Assessment</option>
<option value="Compliance">Compliance with PCI, NERC CIP, PIPA, HIA, GDPR, etc.</option>
<option value="Code Security">Development and Code Security </option>
<option value="DMARC automation">DMARC automation</option>
<option value="Careers">Work with ThreeShield</option>
<option value="Internship">Internship</option>
<option value="Media Inquiry">Media Inquiry</option>
<option value="Expert Witness">Expert Witness</option>
<option value="MSP Partner">Become an MSP Partner</option>
<option value="vendor">Sell to ThreeShield</option>
<option value="Bug Bounty">Bug Bounty</option>
<option value="Free Training">Free Security Awareness Training for schools and community groups</option>
</select>
</div>
</div>
<div id="reCAPTCHAfollowup"></div>
</div>
</form>
<form class="mb-0">
<div>
<label class="form-label font-medium">Number of Users: </label>
<div class="form-icon relative mt-2">
<svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"
class="feather feather-users w-4 h-4 absolute top-3 ltr:left-4 rtl:right-4">
<path d="M17 21v-2a4 4 0 0 0-4-4H5a4 4 0 0 0-4 4v2"></path>
<circle cx="9" cy="7" r="4"></circle>
<path d="M23 21v-2a4 4 0 0 0-3-3.87"></path>
<path d="M16 3.13a4 4 0 0 1 0 7.75"></path>
</svg>
<input type="number" min="0" value="0" class="form-input ltr:pl-12 rtl:pr-12" placeholder="Users:" id="users" name="users">
</div>
</div>
<div>
<label class="form-label font-medium">Number of servers/instances: </label>
<div class="form-icon relative mt-2">
<svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"
class="feather feather-server w-4 h-4 absolute top-3 ltr:left-4 rtl:right-4">
<rect x="2" y="2" width="20" height="8" rx="2" ry="2"></rect>
<rect x="2" y="14" width="20" height="8" rx="2" ry="2"></rect>
<line x1="6" y1="6" x2="6.01" y2="6"></line>
<line x1="6" y1="18" x2="6.01" y2="18"></line>
</svg>
<input type="number" min="0" value="0" class="form-input ltr:pl-12 rtl:pr-12" placeholder="Servers:" id="servers" name="servers">
</div>
</div>
<div>
<label class="form-label font-medium">Number of workstations/endpoints: </label>
<div class="form-icon relative mt-2">
<svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"
class="feather feather-monitor w-4 h-4 absolute top-3 ltr:left-4 rtl:right-4">
<rect x="2" y="3" width="20" height="14" rx="2" ry="2"></rect>
<line x1="8" y1="21" x2="16" y2="21"></line>
<line x1="12" y1="17" x2="12" y2="21"></line>
</svg>
<input type="number" min="0" value="0" class="form-input ltr:pl-12 rtl:pr-12" placeholder="Desktops:" id="desktops" name="desktops">
</div>
</div>
<div id="creditcarddetails" style="display:none;">
<label class="form-label font-medium">How do you accept credit cards?</label>
<div class="form-check form-switch">
<input class="form-check-input" type="checkbox" id="PCIA">
<label class="form-check-label" for="PCIweb" style="text-transform:none">Website</label>
</div>
<div class="form-check form-switch">
<input class="form-check-input" type="checkbox" id="PCIB">
<label class="form-check-label" for="PCIB" style="text-transform:none">Credit card terminal(s)</label>
</div>
<div class="form-check form-switch">
<input class="form-check-input" type="checkbox" id="PCICVT">
<label class="form-check-label" for="PCICVT" style="text-transform:none">Virtual Terminal</label>
</div>
<div class="form-check form-switch">
<input class="form-check-input" type="checkbox" id="PCIphoneother">
<label class="form-check-label" for="PCIphoneother" style="text-transform:none">Phone/Other</label>
</div>
<div class="form-check form-switch">
<input class="form-check-input" type="checkbox" id="PCID">
<label class="form-check-label" for="PCID" style="text-transform:none">We store credit card numbers</label>
</div>
</div>
<div>
<input type="button" id="button3" onclick="submitform3();" class="btn bg-indigo-600 hover:bg-indigo-700 border-indigo-600 hover:border-indigo-700 text-white rounded-md w-full" value="Final thoughts • ➤">
</div>
</form>
<form class="mb-0">
<div class="grid grid-cols-1">
<div class="mt-5">
<div class="form-icon relative mt-2">
<svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"
class="feather feather-message-circle w-4 h-4 absolute top-3 ltr:left-4 rtl:right-4">
<path d="M21 11.5a8.38 8.38 0 0 1-.9 3.8 8.5 8.5 0 0 1-7.6 4.7 8.38 8.38 0 0 1-3.8-.9L3 21l1.9-5.7a8.38 8.38 0 0 1-.9-3.8 8.5 8.5 0 0 1 4.7-7.6 8.38 8.38 0 0 1 3.8-.9h.5a8.48 8.48 0 0 1 8 8v.5z"></path>
</svg>
<textarea name="questions" id="questions" class="form-input ltr:pl-11 rtl:pr-11 h-28" placeholder="Questions or Concerns"></textarea>
</div>
</div>
</div>
<div>
<div class="grid grid-cols-1">
<div class="mt-5">
<div class="form-icon relative mt-2">
<svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"
class="feather feather-link w-4 h-4 absolute top-3 ltr:left-4 rtl:right-4">
<path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71"></path>
<path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71"></path>
</svg>
<textarea name="websites" id="websites" class="form-input ltr:pl-11 rtl:pr-11 h-28" placeholder="Your website(s)"></textarea>
</div>
</div>
</div>
</div>
<div>
<div class="grid grid-cols-1">
<div class="mt-5">
<div class="form-icon relative mt-2">
<svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"
class="feather feather-mail w-4 h-4 absolute top-3 ltr:left-4 rtl:right-4">
<path d="M4 4h16c1.1 0 2 .9 2 2v12c0 1.1-.9 2-2 2H4c-1.1 0-2-.9-2-2V6c0-1.1.9-2 2-2z"></path>
<polyline points="22,6 12,13 2,6"></polyline>
</svg>
<textarea name="legal" id="legal" class="form-input ltr:pl-11 rtl:pr-11 h-28" placeholder="Legal name and addres for agreements"></textarea>
</div>
</div>
</div>
</div>
<div>
<input type="button" id="button4" onclick="submitform4();" class="btn bg-indigo-600 hover:bg-indigo-700 border-indigo-600 hover:border-indigo-700 text-white rounded-md w-full" value="Please contact me">
</div>
</form>
<form class="mb-0">
<div>
<label class="form-label font-medium">LinkedIn Profile: </label>
<div class="form-icon relative mt-2">
<svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"
class="feather feather-linkedin w-4 h-4 absolute top-3 ltr:left-4 rtl:right-4">
<path d="M16 8a6 6 0 0 1 6 6v7h-4v-7a2 2 0 0 0-2-2 2 2 0 0 0-2 2v7h-4v-7a6 6 0 0 1 6-6z"></path>
<rect x="2" y="9" width="4" height="12"></rect>
<circle cx="4" cy="4" r="2"></circle>
</svg>
<input type="text" class="form-input ltr:pl-12 rtl:pr-12" placeholder="https://ca.linkedin.com/in/yourname" id="linkedin" name="linkedin">
</div>
</div>
<label class="form-label font-medium"><br>Please check your knowledge area(s): </label>
<div class="flex justify-between pb-4">
<h6 class="mb-0 font-medium">AWS and network infrastructure</h6>
<div class="form-check">
<input class="form-check-input" type="checkbox" value="yes" id="AWS">
<label class="form-check-label" for="AWS"></label>
</div>
</div>
<div class="flex justify-between py-2 border-t border-gray-100 dark:border-gray-700">
<h6 class="mb-0 font-medium">M365 and Azure AD</h6>
<div class="form-check">
<input class="form-check-input" type="checkbox" value="yes" id="M365">
<label class="form-check-label" for="M365"></label>
</div>
</div>
<div class="flex justify-between py-2 border-t border-gray-100 dark:border-gray-700">
<h6 class="mb-0 font-medium">PHP, JavaScript, and SQL</h6>
<div class="form-check">
<input class="form-check-input" type="checkbox" value="yes" id="PHP">
<label class="form-check-label" for="PHP"></label>
</div>
</div>
<div class="flex justify-between py-2 border-t border-gray-100 dark:border-gray-700">
<h6 class="mb-0 font-medium">Rust or Flutter</h6>
<div class="form-check">
<input class="form-check-input" type="checkbox" value="yes" id="rust">
<label class="form-check-label" for="rust"></label>
</div>
</div>
<div class="mt-5">
<div class="form-icon relative mt-2">
<svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"
class="feather feather-message-circle w-4 h-4 absolute top-3 ltr:left-4 rtl:right-4">
<path d="M21 11.5a8.38 8.38 0 0 1-.9 3.8 8.5 8.5 0 0 1-7.6 4.7 8.38 8.38 0 0 1-3.8-.9L3 21l1.9-5.7a8.38 8.38 0 0 1-.9-3.8 8.5 8.5 0 0 1 4.7-7.6 8.38 8.38 0 0 1 3.8-.9h.5a8.48 8.48 0 0 1 8 8v.5z"></path>
</svg>
<textarea name="carquestions" id="carquestions" class="form-input ltr:pl-11 rtl:pr-11 h-28" placeholder="Summary of your ideal job and how to reach you"></textarea>
</div>
</div>
<div>
<input type="button" id="button4" onclick="submitform4career();" class="btn bg-indigo-600 hover:bg-indigo-700 border-indigo-600 hover:border-indigo-700 text-white rounded-md w-full" value="Please contact me">
</div>
</form>
Text Content
* * * Holistic IT * About ThreeShield * Calgary Cyber Security * Calgary IT Support * Holistic IT vs “Managed” IT * Boost your IT Department * Backup & Business Continuity * Security Awareness Training * Code Review * Audit Preparation * Solutions * For IT Pros * Level 3 Support * Code Review * OWASP, PCI, & PII Training * Backup & Business Continuity * Audit / Compliance * Audit Preparation * NERC-CIP * Code Review * Info * How to... * 2024 DMARC requirements * MFA for Cloud Services * Extensions to Quarantine * IT Insights * Hidden Appliance Vulnerabilities * News & Breaches * EasyXDM Vulnerabilities * ESXiArgs VMware Ransomware Feb 2023 * OneNote Phishing 2023 * December 2022 LastPass Breach * ABTraceTogether Cybersecurity & Privacy * Were you caught watching porn or using LinkedIn? * COVID-19 * COVID-19 Business Continuity * ABTraceTogether Cybersecurity & Privacy * Phishing * Encrypted Email Phishing * File Sharing Hacking & Phishing * Were you caught watching porn or using LinkedIn? * Emergency IT Support * Blog * ThreeShield Careers Supporting growing businesses so you can thrive with comprehensive, compliance-focused cybersecurity and IT Support: IT Staff Support Augment IT | Find Gaps | Monitor & configure Management Confidence Managed IT Security | Business IT Support | Compliance | IT Audit | Comprehensive IT | Startup Ransomware | Cybersecurity Insurance Questionnaires DevOps, SRE, SOC Code Security Review | Independent IT Audit | L3 CONGRATULATIONS ON YOUR NEW BUSINESS! We look forward to hearing about your new endeavour so we can work together to: * Design your websites and apps securely to prevent costly fixes * Reduce your credit card fees and avoid PCI (Payment Card Industry) fines * Ensure compliance with privacy and industry requirements * Prevent breaches to your Microsoft, Google, AWS, and other services * Keep your internal network fast, accessible, and secure * Prepare for insurance, bank, vendor, client, and PCI questionnaires/audits * Prevent well-meaning employees from accidentally infecting your company * Prepare for outages and breaches so you can work on building your business GET BACK TO BUSINESS WITHOUT CONSTANT IT FIRES An IT support technician can't manage your IT by themselves. You need sound business-focused IT strategies and a holistic view that includes your business-critical tools, protection from hackers, day-to-day operations, and prevention to transform IT from an area of constant problems and outages to one that can give you a competitive advantage! * Add reliability to prevent IT emergencies * IT security awareness training to make employees more resilient * Regular monitoring to prevent potential breaches and problems from spiralling out of control * Maintain compliance and minimize the impact of disasters through comprehensive backups, redundancy, and business continuity * Comprehensive system management from workstation to servers and cloud * Supplement existing IT with comprehensive, strategic IT and security management * Holistic IT management grounded in cybersecurity certifications and experience from small business to government to Fortune 50 CYBERSECURITY AND INSURANCE QUESTIONNAIRES Questionnaires from insurance, banks, clients, and vendors can be overwhelming. Our comprehensive approach to information security controls make these a breeze. * If you're an existing client, you likely have everything they want so we can quickly prioritize missing pieces and fill in the questionnaire for you. * If this questionnaire is why you're reaching out to us, we can fast-track your implementations, include the questionnaire in your organizational requirements, quickly complete the form, and wind up with more reliable IT as a side benefit. * If your credit card processor wants you to fill out a PCI (Payment Card Industry) SAQ (Self-Assessment Questionnaire), we can likely reduce your compliance burden and quickly implement the controls they want to see for SAQ A, A-EP, B, B-IP, C, C-VT, or D using our proven drop-in PCI compliance. PREVENT AND RECOVER FROM RANSOMWARE Ransomware protection needs to come in many layers: we prevent the bad guys from coming in, isolate them if they do, provide an easy way to recover any damaged files, and make it easy for you to qualify for cybersecurity insurance. This multi-pronged approach covers you in the worst-case -- while minimizing the likelihood of that happening. Our Ransomware Defense package includes: * Internet, workstation, and cloud service firewall monitoring and configuration * Breach detection, endpoint detection and response, antivirus, wireless, and firewall configurations that isolate infected computers * Canadian backups for Microsoft 365 (including Teams, email, OneDrive, SharePoint, calendars), Google Workspace, workstations, web servers, WordPress, AWS, and firewalls * Patching for Windows, Mac, Linux, and network equipment for applications and operating systems * Website (including WordPress) protection * Microsoft 365, Google Workspace, Internet firewall, and workstation breach and attack monitoring * Comprehensive information security controls, including policies that cyber insurance policies require CHECK IT BEFORE YOU SHIP IT We use a combination of automated code review and library management with well-honed manual code reviews and functional testing to improve your product quality, reduce bug bounties, and improve your reputation. WE DON'T HAVE L1 SUPPORT When you call or email us, you'll get an experienced expert with a diploma or degree supplemented with certification(s) in cybersecurity and extensive experience. We're happy to help set up your printer. However, you can also use us as your Tier 2 and 3 support levels. In addition to coming to ThreeShield well-qualified, we continually invest in training our team to extend their cybersecurity, AWS, and Microsoft 365 skills. ONE CALL TO GO FROM OVERSTRESSED TO HERO Let's get you what you need to: * Add reliability so you can stop putting out fires * Cybersecurity analysis to give you more time * Know your systems get checked every morning * Show management the benefits of your new proactive approach * Backup email, OneDrive, Google Workspace, workstations, servers, etc. * Review coding changes to avoid disaster * Topical security updates that you can send out to staff * Advanced security insights, such as fake virus notices and external email spoofing Read More SHOW YOU KNOW WHAT TO DO. Do you need the support of an independent audit to get management to approve doing the right thing? Our methodology covers your compliance and custom scope requirements while providing freedom to experienced, certified auditors with government and Fortune 50 experience to do a deep-dive into your systems, Microsoft, Google, AWS, and other service provider configurations. * Compliance audits: PCI (credit cards), NERC-CIP, Alberta and BC Health * IT and Privacy regulations for Canada, United States, Europe, Australia... * Best practices, deep-dive, or standards-based INDEPENDENT SET OF EYES ON YOUR IT From independent auditor assessments to find and fix engagements, ThreeShield will provide an unbiased and actionable review of your environment. Unlike Big4 accounting firms, your audit team will exclusively consist of experienced security professionals led by a Certified Information Systems Auditor with extensive government and Fortune 50 audit experience following a methodology that allows for a deeper dive than you've ever experienced before. This approach means that we often provide over 200 findings when other firms found fewer than five the year before. * Comprehensive control reviews, penetration tests, insurance questionnairess * Compliance audits: PCI (credit cards), NERC, Alberta and BC Health * IT and Privacy regulations for Canada, United States, Europe, Australia... * Best practices, deep-dive, or standards-based * One-off assessment, follow-up, or ongoing IT controls monitoring * Preparation and/or pre-audit to ensure success. FAST TRACK SUSTAINABLE COMPLIANCE Save money by reducing your compliance burden, using a proven set of tools, policies, and monitoring to quickly achieve compliance and stay compliant. * PCI-DSS (credit cards)and NERC-CIP * IT and Privacy regulations for Canada, United States, Europe, Australia... * Alberta and BC Health compliance TOO BUSY PUTTING OUT FIRES TO PREVENT THEM? You're a call away from being a relaxed hero! Let's get you what you need to: * Windows, Linux, Mac, Firewalls, AV, EDR * AWS, M365, Google * Endpoint configurations and user-focused protection * Security Awareness Training, Phishing Simulations * Backup for email, OneDrive, Google Workspace, workstations, servers * DMARC (email spoofing) * Chrome and Edge risks like notification popups and extensions Tell us what keeps you up at night: Calgary: (403) 538-5053 Vancouver: (778) 731-1339 Toronto: (289) 724-8829 Toll-free: (877)528-2925 Cybersecurity Careers × LET'S EXPLORE SOLUTIONS! Your Goal... Answer cybsecurity / compliance questions or concerns Secure my new business Supplement existing IT Comprehensive IT and cybersecurity Assessment / Pen Test Respond to breach Securely configure & monitor existing systems & services Gap Assessment Compliance with PCI, NERC CIP, PIPA, HIA, GDPR, etc. Development and Code Security DMARC automation Work with ThreeShield Internship Media Inquiry Expert Witness Become an MSP Partner Sell to ThreeShield Bug Bounty Free Security Awareness Training for schools and community groups We only accept communications through this web form from Canada. To reach us from outside of Canada, please call our Calgary phone number: +1 (403) 538-5053 Feel free to chat with us during business hours or call one of the following numbers to get started: Alberta: 1 (403) 538-5053 BC: 1 (778) 731-1339 Ontario: 1 (289) 724-8829 Canada: 1 (877) 528-2925 California: 1 (510) 214-6010 WHAT ARE YOUR PRIORITIES? COMPREHENSIVE IT ASSESSMENT SECURE/MANAGE IT SYSTEMS WEB/INTERNET ASSESSMENT FILL IT GAPS REVIEW OR DESIGN SECURE CODE SECURITY AWARENESS TRAINING PCI CREDIT CARD COMPLIANCE HEALTH AND PRIVACY COMPLIANCE NERC OR PIPELINE COMPLIANCE BACKUP / DISASTER RECOVERY GOOGLE / M365 SECURITY Number of Users: Number of servers/instances: Number of workstations/endpoints: How do you accept credit cards? Website Credit card terminal(s) Virtual Terminal Phone/Other We store credit card numbers Please watch this short video before applying for your first job in cybersecurity: LinkedIn Profile: Please check your knowledge area(s): AWS AND NETWORK INFRASTRUCTURE M365 AND AZURE AD PHP, JAVASCRIPT, AND SQL RUST OR FLUTTER Thank you for reaching out. Typically, we're able to respond the same or next business day. CYBERSECURITY FIRST • CUSTOMIZED FOR YOU BALANCED & HOLISTIC APPROACH TO PROACTIVE IT We get it: even the best system administrators can't fix all of your computer issues, deal with the cloud, stay on top of PCI and privacy compliance, stay abreast of emerging cybersecurity threats, and plan to reduce all of the problems they're solving. Even with a team of developers, IT support staff, and outsourced “IT service” providers, you need proactive and holistic information technology and information security assessment, management, and tier-three support so you can stop having to react to IT problems, outages, and attacks. We can even provide local remote and on-site Toronto, Vancouver, and Calgary IT Support. Read More Assesment & Controls Focused PCI, NERC, insurance, health, and privacy audits to in-depth customized comprehensive control assessments using our proven processes, proprietary tools, government and Fortune 50 audit experience, and advanced cybersecurity control certifications. Get Started Instant Proactive IT Team Whether your current “IT Department” is the founder who hands out laptops, a reactive outsourced IT company, or group of desktop support experts, ThreeShield will fill in the gaps to proactively increase reliability and support your current IT and non-IT staff with experienced IT and Information Security experts. Get Started Securely Configure & Monitor Anyone can install a server or wireless network; turn on a laptop; fill in a website template; or sign up for an AWS, Google Workspace, or Microsoft 365 account. However, it takes experts to securely configure, maintain, and monitor these systems to prevent outages and threats like ransomware. Get Started EXPERIENCE WITH ACCOUNTING, AEROSPACE, FINTECH, GOVERNMENT, HEALTHCARE, LAW, OIL & GAS, RETAIL, STARTUPS, AND OTHER SECTORS SOME OF THREESHIELD'S CLIENTS ThreeShield Information Security has provided customized IT security tools and consulting to organizations of all sizes, including the following: 1-Page • ACE Project Marketing • Affirm Chartered Accountants • Alberta 2030 Commonwealth Games • Avenge Energy Services Inc. • Calgary Foothills Primary Care Network • Carrier Corporation • Centre for Affordable Water and Snitation Technology • Cigar Place • Citadel Drilling • Collins Barrow Calgary LLP • Commodity Trading Firms (confidential) • Computer Sciences Corporation • Deloitte • Ear Candy • Ernst & Young • Encompass Medical Experts • Escape Ops • Financial advisors • Fintech companies (confidential) • First Gulf Bank • Government of Alberta • Hamilton Sundstrand Corporation • Hurricane Computer Solutions • IntelliView Technologies • International Aero Engines • I.T. Connex • KPMG • Linden Research (Linden Lab) • Magtec • Marda Loop Braces • MTA Urban Design Architecture Interior Design • NASA • NORESCO • Otis Elevator Company • Party Enterprises • Plateau Systems • Pratt & Whitney • Precious metals (confidential) • Red Link SA (Argentina) • Segurança da Informação e Conformidade • Sikorsky Aircraft Corporation • Strut Creative • Tech Fuel • Tilia Inc • TOOT'n TOTUM • Towers Watson • United Technologies Corporation • Universidade de São Paulo • UTC Power • Wealth 'N tax • Whitecap Resources Inc • YR Plans What our clients think about our holistic security-first and business-focused approach: Vince Non-profit Chris at ThreeShield provided really great expertise around our online security needs. His process walked us through a full review in a fun and informative way and then offered practical prioritized recommendations to empower us to boost our productivity and enhance our security without it being too big of a hassle. Chris and his team took us beyond just changing settings. They educated us with valuable tips and tricks that allowed us to evolve and better understand our needs and our audience. The simple changes improved our reliability and reduced risks that were baked into our old process and default web hosting settings. I'd recommend Chris and his team to anyone who knows they need help, or us unsure of what help they need. ThreeShield will take care of you. * * * * * Scott CTO, Tilia Inc. (Financial Technology and Online Payments) As the Chief Compliance Officer of a payments entity, I have relied on ThreeShield Information Security to provide risk-based solutions that have satisfied regulators and business partners alike. While our Money Services Business is unique in that it supports commerce within virtual worlds and video game environments, the security standards that we have to meet are the same as they would be for any regulated financial institution. ThreeShield has employed a dynamic, risk-based approach to information security that is specific to our business needs but also provides comfort to our external stakeholders. I recommend their services. * * * * * Debbi Director of Customer Support Chris [of ThreeShield] was keen on building partnerships of understanding with key stakeholders, and made the effort to understand the needs of the customer support team in terms of information, and balance those with the regulatory concerns -- both in specific and in general -- over PII, data storage and transmission, etc. It is this proactive approach that ensured that we had an open line of communication with Chris, and made me feel confident that when reaching out to him with a question or concern would net me a direct and actionable response. * * * * * Noelle IT Architect, Financial Technology and Online Retail Collaborating with ThreeShield to ensure data security was an exciting and educational experience. As we exploded in growth, it was clear that we needed to rapidly mature on all fronts, and ThreeShield was integral to building our confidence with information, software, and infrastructure security. * * * * * Matt Sales Enablement Lead, Precious Metals ThreeShield is a really good company to work with. They have a great blend of security and efficiency, making sure that you are 100% secure, but not at the expense of your productivity. 10/10 would use them again. * * * * * Tara Senior Director of Systems and Build Engineering ThreeShield very much values active and respectful collaboration, and went out of their way to get feedback on policies to make sure proposals balanced business needs while not making employees feel like they were dealing with unreasonable overhead. By doing so ThreeShield really helped change the culture around security mindfulness is positive ways. * * * * * Chris B. IT Analyst, Oil & Gas Awesome company, great people to interact with, smart, quick responding, and reasonably priced too. * * * * * Brian IT Security Director, Linden Lab (Virtual Reality) ThreeShield helped us focus our efforts, enhancing our security posture and verifying PCI compliance. All of this was achieved with minimal disruption to the engineering organization as a whole. The approach was smart. In a short time, we accomplished what much larger companies still struggle to achieve. * * * * * Moe Senior Trading Lead, Precious Metals Great company to work with! Efficient, secure and always on the ball. Truly a pleasure working alongside Chris & Tyson. Highly recommended. * * * * * Landon VP Operations and Platform Engineering Chris [of ThreeShield] possesses the rare skill in security professionals of understanding broader business and technical demands and using that knowledge to develop a balanced approach to security. He skillfully avoids the dogmatic, prescriptive approach to security I've seen all too often and instead builds a security plan that genuinely strengthens the business. * * * * * BLOG INFORMATION TECHNOLOGY AND INFORMATION SECURITY NEWS NEWS & BLOG ThreeShield's clients receive security updates and proactive action to prevent the items in our block from affecting them before these issues hit the news. Our blog includes a subset of this information delayed after clients are already protected. View full blog CYBERSECURITY NEWS EasyXDM Library 2.5.20 Vulnerabilities 27 March 2023 Cross-site scripting, redirection and other vulnerabilities that we discovered Read More CYBERSECURITY NEWS ESXiArgs VMWare Ransomware 13 February 2023 Why ThreeShield's clients didn't get ESXiArgs ransomware and how you can prevent it or recover from it. Read More PHISHING TRENDS OneNote Phishing 2 February 2023 What do do about the increase in OneNote phishing. Includes attachment extensions to quarantine. Read More ThreeShield Information Security Corporation is a Canadian federal corporation with offices in Calgary, Alberta; Vancouver, BC;and Toronto, Ontario, Canada. * * * * KEY PAGES * Home * About ThreeShield * Infosec Topics * Careers * Privacy Policy * MFA / 2FA * Bug Bounty * Site Map * Calgary IT Blog AS SEEN ON... * BBB * CBC News * Global News RECENT POSTS * 2024 DMARC Requirements 29 January 2024 * EasyXDM Library 2.5.20 Vulnerabilities 27 March 2023 * VMWare ESXiArgs Ransomware 13 February 2023 * Understaffed IT to Hero 25 January 2023 * Phishing through encrypted email services 24 March 2021 * File sharing hacking & phishing 14 January 2021 * COVID-19 Business Continuity & Cybersecurity 3 March 2020 CONTACT US * AB: 1‑403‑538‑5053 * BC: 1‑778‑731‑1339 * ON: 1‑289‑724‑8829 * NW Calgary & Billing: (By Appointment Only) 600 Crowfoot Crescent N.W., Suite 340 Calgary, Alberta T3G 0B4 * SE Calgary: (By Appointment Only) 105, 11500‑29th St. SE Calgary, Alberta Canada T2Z 3W9 This site is protected by reCAPTCHA. The Google Privacy Policy and Terms of Service apply. Calgary photo courtesy of Lisa Bourgeault. © 2006-2024 ThreeShield Information Security Corporation and related companies: ThreeShield Information Security LLC (USA) and ThreeShield Information Security LTD (UK)