Hi, I'm Mordy. I spent several years of my career building out a robust security program for one of the nations largest e-commerce platforms.
I had a sizable budget and a dedicated team at my disposal.
And that left me with a troubling question:
How can the average mid-size Enterprise stay secure and avoid a cyber attack without breaking the bank?
The process is overwhelming.
Security measures are ambiguous, cumbersome and not to mention costly.
But worst of all?
Often times, the holy-grail, time-vaunted cyber security methods don’t actually do anything to lower the risk.
They’re expensive tools that people chase after, while forgetting about security essentials.
That means burning through tens of thousands of dollars–while the doors stay wide open for cyberattackers.
The answer?
It’s not glamorous. It’s not romantic.
It’s simple. And it works.
It starts with three fundamentals:
AWARENESS
RISKS
ENVIRONMENT
EMPLOYEE AWARERNESS
Your employees are the gatekeepers to your security. Do they know how to differentiate between fraud and genuine to keep your business safe?
ANALYZE YOUR RISKS
If you are running Server 2003 on your domain controller, I don’t need to run a 30k test to tell you you're vulnerable. I can tell you that – and where else you’re at risk – by inspecting and assessing your setup.
FORTIFY YOUR ENVIRONMENT
Seal the entry points before hackers find them. We’ll tell you what the best solution is to alleviate your risk, plus guide the implementation.
Our three Guarantees
DO THINGS THAT MAKE A DIFFERENCE
Not that look good, sound good, or make you feel good. Things that will actually strengthen your business and minimize the risk of cyberattacks.
SECURE FROM INSIDE-OUT
No slapdash, superficial solution. Every environment checked for risks. Every risk rated, reported, and resolved. In the right priority.
That’s how you stand up to hackers.
HERE WHENEVER YOU NEED US
Questions? Always welcomed. Need solutions? We’ll partner with your IT team to make it happen. Suggestions? Send them our way! We’re thrilled to hear how we can best work together.
Meet the troops
Mordy Fried
Meet Keystone’s chief. Mordy’s extensive background in cyber security began with him as a simple IT technician, removing viruses and setting up firewalls. Seeing a need in the industry, he eventually designed and taught a course to others looking to become technicians. He then led the cybersecurity team at B&H Photo, NYC. He’s a genuine, get-your-hands-dirty doer who moonlights as a frozen pizza connoisseur. He understands the complexities of cyber threats, and the limitations of standard solutions. He has since successfully developed a custom, comprehensive and proven program that aims to not only keep your business secure but also make sure that hackers know they are not welcome.
Izzy Kleinhendler
Our go-to for anything highly technical, we turn to Izzy for scouting out open risks and seamlessly resolving them. He just makes it easy. Easy to improve security. Easy to minimize cyber attack risks. And easy to guide IT teams in implementing security protocols. After all, he spent years in a senior IT position, earning many awards, most notably the Azure Administrator and AWS Certified Solutions Architect certifications.
Charna Steinberg
Cheerful, energetic, and outgoing, Charna brings a sharp eye for detail and a passion for cybersecurity to every project. A great multi-tasker with organizational skills, Charna runs phishing tests, risk assessments, and vulnerability scans. She takes on projects with confidence, gives 100% effort, and consistently delivers quality results. Charna excels in communication, always keeping clients informed and ensuring their satisfaction. When she's not working, she's dancing.
Bracha Hoberman
Bracha keeps the Keystone process flowing, both in-company and for clients. Using her impressive skillset, Bracha sees Risk Assessment through from interview to report. Her clear, logical mindset is a real asset to our team - she’ll look for the root of a problem, then find the most efficient way to resolve it.
Liam Dwyer
Liam brings extensive expertise in protecting businesses from evolving digital threats. With a strong background in vulnerability assessment, incident response, and security implementation, Liam works tirelessly to secure clients' digital assets. His approach combines proactive threat detection with tailored security solutions, helping businesses build robust defenses from the inside out. Liam's clear communication style makes him a valuable asset in bridging the gap between complex security concepts and practical business needs.
Chavi Klein
Chavi is not our right hand, she’s both. She’s all about solving first, asking later. An unpretentious powerhouse, Chavi coordinates new projects, leads risk assessment interviews, creates security awareness trainings and develops whatever else is in need of her expert touch. Deeply respected by colleagues and clients alike for her quick grasp and quicker action, Chavi’s job description in short is: brilliant multitasker, webinar creator, and problem solver. When she’s not hard at work, Chavi enjoys baking and entertaining her two little daughters.
Esther Zaks
Esther’s coffee is the caffeinated force behind the customized phishing tests and impeccably written reports. She’s always respectful, responsive, and calm, traits that make her client communication sparkle. Aside for her job, which she loves, Esther is a coffee expert (yes, that’s a thing!)