Managed Security

Making your Organization Penetration Proof

We have the services you want to tighten up your security. With Cyber Security Awareness Training your organization will be able to measure and restrict human error as a security risk. With Network Assessments you will stay ahead of security weaknesses through earliest discoveries, recognition of potential threats and fortification. With Email Management you will gain up-to-date protection and encryption of your communications through email. Lastly, Data Protection will help your organization become resilient to all predictable conflicts. This could be anything from a targeted attack to natural disasters.

Making Your Organization Penetration Proof

Cyber Security Awareness Training

Due to high demand, we created a dedicated team for Cyber Security Awareness Training. Our services include Interactive Cyber Security Awareness Training Session, Standard Cyber Security Awareness Training, and Phishing Simulations and Reporting. We also have Annual Cyber Security Awareness Training on a yearly basis.

Why you should get CSAT

  • Easy Setup Up

  • Phishing Simulator

  • Measurable Results

  • Mandatory Requirement
    for Cyber Insurance

  • Proven Efficacy

  • Interactive Courses

  • Ongoing Defense

Dark Web Monitoring

Our Dark Web Monitoring focuses on cyber threats that are specific to our clients’ environments. We monitor the Dark Web and the criminal hacker underground for exposure of our clients’ credentials to malicious individuals.

Our Dark Web Monitoring Principals & Services

  • Preparation

  • Pervention

  • Dedicated Security Specialist

  • Perdiction

  • 24/7 Monitoring

  • Alerts & Report Analytics

Network Assessments

We lock our doors with keys and passwords because we have things we do not want lost or stolen. With our network assessments you will understand in depth any vulnerabilities found in your organization and how to combat them. Our comprehensive IT security assessments include Cyber Security Risk Assessments, Vulnerability Scanning, Penetration Testing, and IT Security Audits.

Our Assessment Process

  • Identification

  • Analysis

  • Prioritization

  • Remediation

Email Management

With our Email Management everything will be managed for you, ensuring your communications will work without your employee or client needing to lift a finger. Our Email Migration services can help you adapt to your organizational needs as we guide you and help you avoid the common pitfalls and problems associated with email data migrations.

Key Advantages

  • Data Protection

  • Secure Sending

  • Email Delivery

  • Password Managers

  • Shared Inbox

  • Device Setup

  • Mailbox Security

  • Ransomware & Cyber Attacks

Data Protection

We will protect your organization by understanding your environment and forming a security plan that will defend you from threats. Our Data Protection includes our Business Continuity and Disaster Recovery (BCDR), Cloud Continuity for PCs, File Protection, Workplace, and Software-as-a-Service (SaaS) Protection.

Why you need Business Continuity

  • Quick Recovery

  • Flexible Protection

  • Reliable Technology

  • Secure Backup

  • Ransomware Detection

  • Reduce Downtime


Thanks Simmer (and to the rest of the E-Tech team) for the great presentation…I found it very informative.

– Paolo A. (Vaughan, Ontario)

Hi Ian, Corey, and Simmer, thank you for the webinar session today. It was very informative and the examples shown were great. You pointed out things to look for in an email, and I think it’s actionable steps that we can take. Very practical! We look forward to receiving the emails tomorrow to start the modules. We’ll ask staff to complete the modules by the end of June so that everyone is on the same page. I’m curious to see who will fall for those simulated emails! ha Thanks again!

– Rebecca N. (Toronto, ON)

Thank you again Simmer, Ian and Corey. This was great presentation on CSAT and I was receiving a lot of comments about how scary it is. Looking forward to another great presentation next week.

– Igor G. (Ottawa, ON)

When Ian arrived at our first meeting I was impressed he had already researched us on the Dark Web. We immediately rectified any possibility of it causing harm. We rely on the E-Tech Team for their expertise on a daily basis to keep us safe and protected. We value their support.

– Karla H. (Etobicoke, ON)

Through both his company E-Tech’s hosting services and his personal services as a cyber-security training expert, Ian has been very helpful to us over the past few years. We have enjoyed working with him and find that he and his team are always very responsive.

– Andy K. (Mississauga, ON)

It is my pleasure to recommend Ian as a reliable, knowledgeable, and resourceful technical support specialist / business partner who is promptly and efficiently responding to his clients needs.

– Mihaela M. (Toronto, ON)

I have been working with Ian and his team for quite some time now. He has always been prompt and courteous in providing support but also goes the extra mile for his clients. His team is well positioned to handle a range of IT issues but also versed in providing very relevant training in areas such as Cyber security among others. I make no hesitation in recommending the services of E-Tech.

– Roger R. (Mississauga, ON)

Love the format of the Cyber Security Awareness Training modules. Informative, snappy, not too long. And a little bit interactive to keep us engaged!

– Janine L. (Guelph, ON)

Ready to reinforce your Security?

Ready to reinforce your Security?