Strange Security

Strange SecurityStrange SecurityStrange Security
  • Technology
  • Security
  • Mining
  • More
    • Technology
    • Security
    • Mining

Strange Security

Strange SecurityStrange SecurityStrange Security
  • Technology
  • Security
  • Mining

At Strange Security, we focus on providing security consulting services to help small businesses in Northern Michigan elevate their security posture to an enterprise level. We develop tailored security solutions for each client, identifying security problem areas through comprehensive network vulnerability scans. Our team collaborates with businesses to find realistic solutions and creates a detailed remediation plan to ensure project completion. While we can assist in the remediation process, most clients find that our clear and detailed plan is easy to follow on their own!

Offerings

Assisted Self Assessment

Assisted Self Assessment

Assisted Self Assessment

We send you a security checklist, which you fill out yourself. Afterward, we conduct network vulnerability scans and analyze the data to provide our security consulting insights and recommendations for improvement. We then review these security solutions together with you.

Risk Consulting

Assisted Self Assessment

Assisted Self Assessment

We will analyze your security posture from a high level, including conducting network vulnerability scans. Following this assessment, our security consulting team will assist you in creating, revising, or planning security solutions that best suit your business needs.

Full Risk Assessment

Assisted Self Assessment

Full Risk Assessment

We have a kickoff meeting outlining the project, where we engage in security consulting to examine your company's security posture in depth. We conduct network vulnerability scans and analyze the collected data thoroughly and prepare a comprehensive report on our findings. Finally, we review the report with you to discuss tailored security solutions.

Assessment Components

Network Scans

Physical Security

Physical Security

All network nodes undergo network vulnerability scans to identify potential risks, ensuring that our security consulting services can provide effective security solutions.

Physical Security

Physical Security

Physical Security

Physical access controls, including social engineering, are tested as part of comprehensive security consulting, which also includes network vulnerability scans to identify potential risks and effective security solutions.

Policy

Physical Security

Manual Exploration

The company-wide security policy review encompasses various aspects including employees, access control, and password policy, as well as incident response strategies. This review also integrates network vulnerability scans and insights from security consulting to enhance our overall security solutions.

Manual Exploration

Employee Risk Training

Manual Exploration

Review all security aspects that network vulnerability scans and automated exploration might overlook, and consider engaging in security consulting to enhance your overall security solutions.

Employee Risk Training

Employee Risk Training

Employee Risk Training

Review the company's standards on training employees on best security practices, including the importance of conducting network vulnerability scans and the need for effective security consulting to implement comprehensive security solutions.

Website & Email

Employee Risk Training

Employee Risk Training

Conduct network vulnerability scans and evaluate external websites and company email to ensure adherence to best security practices through effective security consulting and tailored security solutions.

Reporting

Satisfaction Guaranteed

Satisfaction Guaranteed

Findings from the assessment are organized into an understandable report that even non-technical individuals can follow. For those seeking deeper insights, technical details and security solutions are also provided in appendices, reinforcing our security consulting approach.

Satisfaction Guaranteed

Satisfaction Guaranteed

Satisfaction Guaranteed

 We will never dump a report on you and leave. If you are not happy, we are not happy. Our security consulting team will assist you in understanding the report in detail until you are fully satisfied with our security solutions.

About Me

Technical Experience

Technical Experience

Technical Experience

I have been pursuing my passion for security since 2008 and hold a master's degree in information, security, and intelligence from FSU. Additionally, I possess a Certified Ethical Hacker certification through EC Council. For six years, I worked as the lead Security & Systems Administrator at a small Northern Michigan business that provide

I have been pursuing my passion for security since 2008 and hold a master's degree in information, security, and intelligence from FSU. Additionally, I possess a Certified Ethical Hacker certification through EC Council. For six years, I worked as the lead Security & Systems Administrator at a small Northern Michigan business that provided security solutions to a Fortune 50 company, where I conducted network vulnerability scans to enhance our security consulting services.

Who Am I?

Technical Experience

Technical Experience

Hi! My name is Michael Strange, and I was born and raised in Northern Michigan. My high school sweetheart is my wife, and we have four incredible children. We love to boat, hunt, fish, hike, or enjoy anything outdoors. I have a deep passion for helping small businesses enhance their security through effective security consulting and netwo

Hi! My name is Michael Strange, and I was born and raised in Northern Michigan. My high school sweetheart is my wife, and we have four incredible children. We love to boat, hunt, fish, hike, or enjoy anything outdoors. I have a deep passion for helping small businesses enhance their security through effective security consulting and network vulnerability scans. I love my God, my family, and my work, in that order.

Contact Us

Contact Us

Strange Security

Hours

Open today

08:00 am – 05:00 pm

Monday - Friday: 8am - 5pm

Saturday - Sunday: Closed

231.350.3148

Get a Quote

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

hear from out customers

"I found that the assessment that was performed was critical to keeping my business safe from outside cyber threats through effective security consulting. Michael also went above the initial scope of work, providing several recommendations regarding internal practices, including network vulnerability scans, that would result in reduced shrink and increased efficiencies in my business." ~Sean, Owner, Eastport Market

  • Technology
  • Security
  • Mining

Strange Security

Copyright © 2020 Strange Security - All Rights Reserved.

Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept