CLIENTS

Who is Serving Your Business?

The LCC is separated into three sub-clinics, Blue Team, Red Team, and Green Team. Each team has their own specific job and responsibility for your business. These teams collaborate to assit your business in the most beneficial way possible by providing their individual expertise to your unique situation.

What Do Our Teams Offer?

Given that most cyber-attacks on small businesses are caused by system intrusion, miscellaneous errors in basic web applications, social engineering, and privilege misuse, LCC’s training is aimed at educating business owners and employees about the potential threats, risks, and consequences of these common security threats while also imparting knowledge on how to prevent, detect, and respond to such attacks. In addition, our training sessions will also touch upon security defensive mechanisms such as authentication, access control, auditing, and security incident response.

Register for the seminars through the LSBDC website.

Our advisory cyber counseling service offers a well-structured one-on-one personalized guidance and mentorship session with the aim of empowering and enhancing small business cybersecurity decision-making. Through this service, business owner will learn about cybersecurity best practices, they will be exposed to risk management frameworks, and learn how to subscribe to threat intelligence and free assessment toolkits thereby honing their problem-solving skills, and strengthening their risk management capabilities.

This service is an extension of our Cybersecurity Seminars.

The clinic offers a range of hands-on cybersecurity assessments tailored for small businesses. Our all inclusive Cybersecurity Assessment includes:

  • Aimed at uncovering vulnerabilities in web applications.
  • Covers issues like SQL injection, Cross-Site Scripting, and Cross-Site Request Forgery.
  • Uses automated tools such as OWASP ZAP and Burp Suite, along with manual testing techniques.
  • Provides a detailed report with recommendations for addressing identified vulnerabilities.

  • Comprehensive penetration testing for the organization's network.
  • Involves reconnaissance, network scanning, and simulation of real-world attacks.
    Utilizes industry-leading tools like NMAP, Nessus, OpenVAS, Qualys, and Nexpose.
  • Generates a comprehensive report detailing discovered vulnerabilities and recommendations for mitigation.

  • Focuses on the security posture of endpoints, including desktops, laptops, smartphones, and IoT devices.
  • Identifies vulnerabilities in software, hardware, and configurations through automated scanning and manual analysis.
  • Offers insights into potential avenues attackers might exploit.
  • Provides a final report with actionable recommendations to fortify endpoint security.

  • Ensures that small business endpoints align with industry standards.
  • Evaluates device configuration, policy adherence, and regulatory compliance.
  • Leverages advanced tools to assess security settings against recognized benchmarks.
  • Delivers a detailed audit report with findings and actionable recommendations for achieving compliance.

  • Systematically identifies, analyzes, and evaluates potential risks to an organization's information systems and digital assets.
  • Utilizes results from the previous assessments to gauge the potential for exploitation and assess the impact of cyber incidents.
  • Aims to provide deep insights for informed decision-making on risk mitigation, resource allocation, and cybersecurity strategy.

The assessment is broken down into four-week cycles throughout the semester. More information can be found here.

You can apply for this service here.

Our teams are committed to increasing awareness, providing practical knowledge, and improving skills in cybersecurity. Our goal is to empower you with the necessary knowledge, tools, and techniques to make informed decisions about cybersecurity risks. This includes protecting against data breaches, intellectual property theft, financial losses, and safeguarding your reputation—all at no cost to you.

NSA Logo

Industries Impacted

We have worked with businesses all across Lousisiana and positively impacted various industries in the process. 

Healthcare professionals conversating

Our students have worked with healthcare providers to ensure their security procedures align with HIPAA.

Construction worker at a construction site

We have worked with various construction companies making sure all proprietary plans and designs are stored securely.

New York Times square. Showcasing advertising

We have also worked with advertising companies to ensure company accounts and software are securly configured.

 

Testimonials From Past Clients

“ LCC did an excellent job in helping to audit our cyber security posture. This is a critical service for small businesses that often cannot afford a full time team to assist with their cyber security needs. ”

 

“ This service is critical to small to medium sized businesses, which (as most people know) make up the majority of businesses in the US. Smaller businesses (such as ours) tend to not have the resources to have a dedicated cyber security team, so being able to work with LCC to have an internal audit that can show us the areas of vulnerability is critical to our future success as a firm. ”

 

Apply for our Services!

Become A Client