How Vulnerable Are You?

 Provided by HP

Have any of your smart phones, credit card, e-mail, website, T.V.’s or other electronic devices been hacked? Can they be? Do any of the apps you have downloaded have bugs, spyware, geo tracking, hacks or any obtrusive aspects that you don’t even know about?

As a business owner I am sure you use most of these technologies daily. There are even applications like CRM’s, list building tools, social sites, websites…etc that you use to build your business. What if I told you that these tools can be what is opening you up to be vulnerable for an attack? From large corporate companies (Yahoo, Sony) to a small mom and pop shop – we can all be attacked.

Do not think because you are a small business that you can not be compromised? Spyware, malware, bugs, social engineering, etc look for vulnerabilities to gain access to you and your important information – no matter what size of business you are in. In 2015 there where over 75 million peoples’ personal identifiable information stolen (PII). That includes credit card, bank accounts, birth certificates, social insurance/social security numbers…etc from major corporations who spend millions on cybersecurity. This is predicted to increase in 2016.

Don’t be one of the 75+ million that will potentially get compromised in 2016. Learn how you can be pro-active and protect your business and your clients’ information.

Join the KNSS Cybersecurity Community and get the answers and solutions to these and any other security concerns.





Corporate Ransomware
Attacks 2017



Home User Ransomware
Attacks 2017
  • Shoulder Surfing 19% 19%
  • Drive By Downloads 37% 37%
  • Phishing & Vishing Attacks 57% 57%
  • Malicious Email Attachments 65% 65%
  • Malicious Email Links 88% 88%


Cybersecurity Is:

Cybersecurity is the ability to protect or defend the use of cyberspace from cyber-attacks. 

When you think of cyberspace think of; website, social media, email, e-commerce, cloud storage/solutions…etc. Each of these cyber properties need to be hardened (secured) to protect the C.I.A. triad, which stands for Confidentiality, Integrity of your data, and Availability.

Confidentiality is the focus of keeping your data private and protected. It is essential that you keep your information secure from unauthorized users. With the increase of cyber attacks focused on stealing your data, it is essential you have systems in place to protect your data. 

The integrity of your data is the process of protecting your information from being tampered as well confirming the integrity of the data either in transit or at rest in a stored location. 

Availability is important because you want your systems to be available to your staff, vendors, suppliers, and clients when they need access to it. If your systems are compromised that will affect your productivity, have a financial impact and affect your brand.  

It’s important for all companies of any size to make cybersecurity a priority in your business.




KNSS Consulting Group 5-Stage Security Strategy

KNSS Consulting Group Inc. uses a 5-stage security strategy to help you stay protected. These stages are: baseline assessment, security policies & procedures assessment, Cybersecurity Awareness training, cybersecurity systems, and on-going maintenance. This strategy is on-going and needs to be constantly maintained to make sure you stay protected.

Stage #1 Baseline Assessment

A baseline assessment needs to be our first stage to see where your corporation is vulnerable to attacks. This is known in the industry as a penetration test. This is essential to make sure that all vulnerabilities are recorded and addressed.

Stage #2 Security Policies and Procedures Assessment

Security policies and procedures need to be written to help protect your corporation, as well as provide guidelines on what to do when your corporation gets compromised by a cybersecurity attack. These policies and procedures are essential to your cybersecurity strategy.

Stage #3 Cybersecurity Awareness Training

On-going education is essential to maintain your Cybersecurity. With cybersecurity attacks constantly changing and your corporation being attacked from all sides your entire team needs to be constantly be trained on new attack vectors, new ways of protecting the company and how they can protect themselves.

Stage #4 Cybersecurity Solutions

Cybersecurity systems are required to help protect your; data, systems, clients, staff and you from potential attacks. These systems are in place to monitor, alert, notify and help you recover when there is a cybersecurity attack. Examples of a few of these security solutions are endpoint protection, cloud security, patch management, back-ups, anti-virus, anti-malware, just to name a few.

Stage #5 On-going Maintenance

On-going maintenance is the last and most important stage to maintaining your cybersecurity strategy. With Cybersecurity solutions constantly changing, companies updating their software and hackers coming out with new ways to compromise companies. It is important for your cybersecurity posture to constantly be monitored and updated as new Cybersecurity solutions come out.


The KNSS Consulting Team is here to help you. With over 20+ combined years of experience, understand how hard it is to grow your business and maintain a Cybersecurity posture all at the same time is overwhelming. We personally see with the clients we work with how quickly technology changes on them, from POS systems, cloud solutions, inventory control, e-commerce, CRM, accounting solutions…etc always evolving is a full-time just to keep up. Then add the potential vulnerabilities these technologies can create for your business is a full-time job. That is why our team is constantly educating themselves on the newest technologies, Cybersecurity threats, and solutions. To make sure we can provide you with the best cybersecurity solution for your business. 

About Us

Brandon Krieger

Brandon Krieger is the President and Cybersecurity consultant of KNSS Consulting Group Inc. a cybersecurity company that helps small to medium sizes businesses protect themselves.

Joshua Alexander

Web Developer Josh Alexander is on the Community Team for, and routinely speaks at their WordCamps (official WordPress conferences). He is an alpha tester for, and a beta tester for Google Chrome. Josh is also one of the few WCAG 2.0 programmers who make sites web-accessible for disabled individuals.

Our Clientele

Our experience is derived from a combination of our years of experience in the industry and what we have learned from our clients. We have had the great pleasure of working with a wide variety of clients from all types of industries, some of which are listed below. We are fortunate to have worked with such a variety of clients from all of the industries below.

Our Clientele

Our experience is derived from a combination of our years of experience in the industry and what we have learned from our clients. We have had the great pleasure of working with a wide variety of clients from all types of industries, some of which are listed below. We are fortunate to have worked with such a variety of clients from all of the industries below.



















Business Consultants








Health and Wellness









More Info: We want to help you protect yourself and your business. Fill out the contact form and we will get back to you within 24 hours.

Address: 2969 Bloor Street West Etobicoke, ON, M8X 1B8

Phone:  416-239-9351

Business Hours:

10am–5pm Mon – Thur