fbpx

Southern OH and WV

Greg Topps

Account Executive
Greg is based in Columbus, Ohio. A native of New Jersey, Greg is an avid Yankees, Devils, and Giants fan. He also spends MANY fall Saturdays cheering on his beloved Ohio State Buckeyes.
 
Greg is a coach, captain, and player for the Worthington Tigers of the Central Ohio Men’s Adult Baseball League.
 
During the summer, when Greg’s not on the baseball diamond, he fills his free time by going to concerts, exploring the Bourbon Trail in Kentucky, and taking part in the many outdoor events and activities Columbus has to offer!

Services

Cybersecurity

Managed Security (MSSP) with 24/7/365 availability to monitor systems, to back up data, to deter major events, and to respond and to recover from incidents

Security Assessments to identify your risks and recommend best-in-class solutions

Event management to respond to incidents, contain breaches, and to recover from major security events fast and effectively

Consultations to provide you with an ongoing cybersecurity strategy commensurate with the latest threat analysis

Managed IT

Consultations to help you look ahead and build a comprehensive technology roadmap

Cloud System Management to improve efficiency and productivity of your IT infrastructure

24/7/365 Support including virtual and on-site assistance

VOIP service, from consultation to solution recommendation, to implementation and to ongoing management

Digital Transformation

Consultations or immersion engagements to assess your goals, technology, and systems so we can customize a roadmap to transformation

Custom development of software, web, and mobile applications–both internal and customer-facing

ERP selection and project management services

Cloud virtualization to simplify database migration, improve data protection, and ensure business continuity

Systems and application modernization by updating and integrating technologies, as well as establishing a plan to efficiently make future replacements and improvements

One-Time Projects

Technology integrations that are time-consuming and demand specialized knowledge

System and security posture assessments to learn how applications are performing, identify weaknesses, and outline steps for improvement

Compliance gap assessments to see where to make business systems run more efficiently, effectively, and meet compliance requirements

Penetration and wireless breach testing (pentest) exposes vulnerabilities so you can proactively address risks and qualify for your cyber insurance coverage

Security training to help keep your teams up to date on compliance, data safety, cybersecurity dangers and best practices

Cloud migrations including microsoft 365 and other time-intensive migration projects

Resources By This Team Member

Passwordless Authentication: What You Need to Know

Between phishing scams, ransomware and social media cyberattacks, security incidents are now a daily occurrence for many businesses. Attackers are growing in sophistication and are looking to catch your employees off guard to gain access to your critical data. As

Read More