top of page
Search

The Best Laid Plans...

  • Writer: Aaron X.
    Aaron X.
  • Jan 31
  • 3 min read

Atlas Security Consulting

Aaron X. Henton

ECPI University

2021


In this assignment we were asked to identify a sole proprietary business and provide the following information: the product or service, consideration of the factors relating to the business success or failure, a description of the sole proprietary business, and what social responsibility my business will have.


Executive Summary: In our growing digital world, protection of our information and assets is of the utmost importance. Our reliance on the digital infrastructure from our cellular devices to small home networks to corporate data centers is at an all-time high. With regulation and legislation lagging when considering the impact of and unprecedented access to our lives these devices and platforms have garnered, we must be proactive in safe-guarding these digital gateways into our lives and lively-hoods. That is where I step in... Atlas Security Consulting — “your world, my shoulders...”


Reiterating the fact that the digital world will only continue to grow we can anticipate the already staggering numbers of cyber crimes to increase. Atlas Security Consulting’s mission statement is to help safe-guard the digital gateways to your world. The social responsibility of ASC is integrity and an unwavering drive to protect our foundational freedoms and civil liberties in the digital space.  "Security Mindfulness” is our catchphrase and a heightened social understanding of cybersecurity truisms is our motivation.


Service - Per Man Hour of cybersecurity services including but not limited to: Security Audits within the scope of the risk management framework and other federal information assurance security standards, Penetration testing, and social engineering campaigns.


  • Data loss Mitigation:

    • Penetration testing

    • Network Hardening

    • Information assurance training (per seat)

  • HIPAA compliance audits

  • PCI-DSS Compliance audits


Based on knowledge of the field the means of production will be achieved through certification and experience:

-Security +

-CISSP


Clientele


The United States Government: Ideally, with my background in human services health care systems they would be my niche. Specifically, those utilizing Magellan or government funds to provide services. Those utilizing government funds and receiving money from the U.S. government to provide services rendered are held to the federal information assurance standards in both the private sector and local government; however, the U.S. government has no means of point to point enforcement or protocol on HIPAA auditing. This is especially pertinent during the pandemic and moving post-pandemic as healthcare systems have shifted to be more reliant on digital platforms leaving the citizens of the United States most precious and private information at the highest risk with the lowest protection. This information is highly prized and sought after in our current surveillance economy for research, advertising, and other nefarious purposes. Many of the HIPAA standards specifically deal with physical storage of information not just the handling of data in the virtual space, so in order to do a proper audit a person would have to go to the physical location.

  • will travel

  • 250 mile radius


Magellan service provider - Quarterly and annual audits to ensure compliance with HIPAA digital and physical healthcare information storage, processing standards, and federal information assurance standards. 


Local Law Enforcement and Municipal infrastructure

As we move towards a more digitally connected world each new device opens up an attack vector to a network. Local law enforcement and municipalities (to include: hospitals, libraries, city treasuries, and other critical municipal infrastructure) are especially vulnerable as a most precincts and small cities lack the professionals on staff to ensure that their networks, operations, data, devices, and critical infrastructure are protected on a day to day basis to ensure business continuity and functionality of critical assets.


Small to Midsize Businesses

Small businesses are vulnerable in many ways depending on the nature of the services provided by the business. From a mom and pop shop who utilizes credit card readers and apps for point of sale purchases to a law firm that stores and transfers data across many different networks. This information is important and often times critical for business functioning. Factors to Consider:


Disadvantages:

1.) I feel one of the biggest disadvantages to a private owned cybersecurity company is the number of well established cybersecurity firms that provide international protection.

2.) The obvious, larger competitors with more experience, money, and tools.

3.) Artificial intelligence assisted capabilities not accessible to small companies


Advantages:

1.) The ability to cater directly to clientele’s security needs.

2.) A more personal experience.

3.) The ability to be where you need when you need it

Thanks so much ECPI.  I did it! Business class was fun.

 

 

 
 

Recent Posts

See All
The Whole Bipity-bopity

Evidence to attest to severe psychological and emotional trauma resultant from human trafficking even if said disablement occured from...

 
 
Project Love

Proposal for potential contract or pro bono under Atlas Security Consulting, LLC for community engagement campaign (outreach). ...

 
 
What is 50 yards on the Internet?

In response to a facebook post. It seems the expose culture is to be expected when it comes to social media and influence. When...

 
 
bottom of page