At Strange Security, we focus on providing security consulting services to help small businesses in Northern Michigan elevate their security posture to an enterprise level. We develop tailored security solutions for each client, identifying security problem areas through comprehensive network vulnerability scans. Our team collaborates with businesses to find realistic solutions and creates a detailed remediation plan to ensure project completion. While we can assist in the remediation process, most clients find that our clear and detailed plan is easy to follow on their own!
We send you a security checklist, which you fill out yourself. Afterward, we conduct network vulnerability scans and analyze the data to provide our security consulting insights and recommendations for improvement. We then review these security solutions together with you.
We will analyze your security posture from a high level, including conducting network vulnerability scans. Following this assessment, our security consulting team will assist you in creating, revising, or planning security solutions that best suit your business needs.
We have a kickoff meeting outlining the project, where we engage in security consulting to examine your company's security posture in depth. We conduct network vulnerability scans and analyze the collected data thoroughly and prepare a comprehensive report on our findings. Finally, we review the report with you to discuss tailored security solutions.
All network nodes undergo network vulnerability scans to identify potential risks, ensuring that our security consulting services can provide effective security solutions.
Physical access controls, including social engineering, are tested as part of comprehensive security consulting, which also includes network vulnerability scans to identify potential risks and effective security solutions.
The company-wide security policy review encompasses various aspects including employees, access control, and password policy, as well as incident response strategies. This review also integrates network vulnerability scans and insights from security consulting to enhance our overall security solutions.
Review all security aspects that network vulnerability scans and automated exploration might overlook, and consider engaging in security consulting to enhance your overall security solutions.
Review the company's standards on training employees on best security practices, including the importance of conducting network vulnerability scans and the need for effective security consulting to implement comprehensive security solutions.
Conduct network vulnerability scans and evaluate external websites and company email to ensure adherence to best security practices through effective security consulting and tailored security solutions.
Findings from the assessment are organized into an understandable report that even non-technical individuals can follow. For those seeking deeper insights, technical details and security solutions are also provided in appendices, reinforcing our security consulting approach.
We will never dump a report on you and leave. If you are not happy, we are not happy. Our security consulting team will assist you in understanding the report in detail until you are fully satisfied with our security solutions.
I have been pursuing my passion for security since 2008 and hold a master's degree in information, security, and intelligence from FSU. Additionally, I possess a Certified Ethical Hacker certification through EC Council. For six years, I worked as the lead Security & Systems Administrator at a small Northern Michigan business that provide
I have been pursuing my passion for security since 2008 and hold a master's degree in information, security, and intelligence from FSU. Additionally, I possess a Certified Ethical Hacker certification through EC Council. For six years, I worked as the lead Security & Systems Administrator at a small Northern Michigan business that provided security solutions to a Fortune 50 company, where I conducted network vulnerability scans to enhance our security consulting services.
Hi! My name is Michael Strange, and I was born and raised in Northern Michigan. My high school sweetheart is my wife, and we have four incredible children. We love to boat, hunt, fish, hike, or enjoy anything outdoors. I have a deep passion for helping small businesses enhance their security through effective security consulting and netwo
Hi! My name is Michael Strange, and I was born and raised in Northern Michigan. My high school sweetheart is my wife, and we have four incredible children. We love to boat, hunt, fish, hike, or enjoy anything outdoors. I have a deep passion for helping small businesses enhance their security through effective security consulting and network vulnerability scans. I love my God, my family, and my work, in that order.
Open today | 08:00 am – 05:00 pm |
Monday - Friday: 8am - 5pm
Saturday - Sunday: Closed
231.350.3148
"I found that the assessment that was performed was critical to keeping my business safe from outside cyber threats through effective security consulting. Michael also went above the initial scope of work, providing several recommendations regarding internal practices, including network vulnerability scans, that would result in reduced shrink and increased efficiencies in my business." ~Sean, Owner, Eastport Market
Strange Security
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.