Strange Security

Strange SecurityStrange SecurityStrange Security
  • Technology
  • Security
  • Mining
  • More
    • Technology
    • Security
    • Mining

Strange Security

Strange SecurityStrange SecurityStrange Security
  • Technology
  • Security
  • Mining

Security Assessments

At Strange Security we concentrate on helping small Northern Michigan businesses bring their security posture to an enterprise level.  We tailor security solutions to fit each and every client individually.  We identify security problem areas, work with businesses on finding realistic solutions, and create a detailed remediation plan to drive project completion.  We can then assist in remediation, however, most clients find the detailed and clarified plan easy enough to follow on their own!

Offerings

Assisted Self Assessment

Assisted Self Assessment

Assisted Self Assessment

We send you a security checklist, you fill it out yourself, we analyze the data and send our recommendations for improvement.  We then review the recommendations with you.

Security Consulting

Assisted Self Assessment

Assisted Self Assessment

We will analyze your security posture from a high level. We will then assist you with creating, revising, or planning security practices that best suit your business needs.

Full Security Assessment

Assisted Self Assessment

Full Security Assessment

We have a kickoff meeting outlining the project. We meet with you and explore your company's security posture in depth, we analyze the collected data and prepare a full detailed report. We then review the report with you. 

Assessment Components

Network Scans

Physical Security

Physical Security

All network nodes are scanned for vulnerabilities.

Physical Security

Physical Security

Physical Security

Physical access controls including social engineering are tested.

Policy

Physical Security

Manual Exploration

Company wide security policy review including employees, access control, password policy, and incident response.

Manual Exploration

Employee Security Training

Manual Exploration

Review all security aspects that automated exploration would not find.

Employee Security Training

Employee Security Training

Employee Security Training

Review the company's standards on training employees on best security practices.

Website & Email

Employee Security Training

Employee Security Training

Test external web sites and company email for best security practices.

Reporting

Satisfaction Guaranteed

Satisfaction Guaranteed

Findings are organized into an understandable report that even non-technical individuals can follow. Technical details are also provided in appendices.

Satisfaction Guaranteed

Satisfaction Guaranteed

Satisfaction Guaranteed

We will never dump a report on you and leave.  If you are not happy, we are not happy. We will assist you with understanding the report until you are satisfied.

About Me

Technical Experience

Technical Experience

Technical Experience

I have been pursuing my passion for security since 2008 and have a masters degree in information, security, and intelligence from FSU. I also have a Certified Ethical Hacker certification through EC Council. I worked as lead Security & Systems Administrator at a small Northern Michigan business that serviced a Fortune 50 company for 6 years.

Who Am I?

Technical Experience

Technical Experience

Hi! My name is Michael Strange and I was born and raised in Northern Michigan.  My high school sweetheart is my wife and we have four incredible children. We love to boat, hunt, fish, hike, or anything outdoors. I have a deep passion to help small businesses improve their security. I love my God, my family, and my work, in that order.

Contact Us

Contact Us

Strange Security

Hours

Open today

08:00 am – 05:00 pm

Monday - Friday: 8am - 5pm

Saturday - Sunday: Closed

231.350.3148

Get a Quote

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

hear from out customers

"I found that the assessment that was performed was critical to keeping my business safe from outside cyber threats. Michael also went above the initial scope of work and had several recommendations regarding internal practices that would result in reduced shrink and increased efficiencies in my business."  ~Sean, Owner, Eastport Market

  • Technology
  • Security
  • Mining

Strange Security

Copyright © 2020 Strange Security - All Rights Reserved.

Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept