We know there are a lot of questions when it comes to choosing who you want to work with as your trusted IT Service Provider and we have the answers.
The FPA Stack is how we provide the most comprehensive foundation for network performance, stability, and security.
Hear what a few of our clients have to say about us.
FPA provides IT services to both businesses without inhouse IT capabilities as well as supplement IT departments.
Check out our take on the latest goings on in IT that matters to our clients. Truly THE IT Blog for LA Businesses.
The Technology Resource Center for Investment Advisors in the greater Los Angeles area loaded with free resources, tools, and information.
Nothing communicates success like a client case study. Check out how we've helped similar clients solve their IT problems.
The Technology Resource Center for CPA's, Accountants, and Business Managers in the greater Los Angeles area loaded with free resources and tools.
See the schedule of our upcoming informative events including webinars, lunch and learns, and speaking engagements.
The Technology Resource Center for Distributors in the greater Los Angeles area loaded with free resources and tools.
Receive all the information you need on IT services, IT managed services, cyber protection, network management and more with FPA's IT resources.
Start with Why. Learn about what drives us to make FPA the premiere IT Service Provider in the Greater Los Angeles area.
Meet our team and learn about our capabilities and what makes us tick.
FPA in the press provides a glipse of all the great things going on at FPA.
Do you have what it takes to work at LA's premiere IT Service Provider? Check out our current open positions.
Learn about our benefits program. We recognize that our success is based on the quality of our staff and taking care of our staff is a critical core value.
To help you prepare, check out what to expect during the candidate evaluation process. We believe in transparency. We lay it all out there for you to see.
FPA University is our proprietary core curriculum designed to help our staff succeed. Learn what it's all about.
Check out what the essential character traits needed for a successful career at FPA. Learn the secrets behind what it takes to be great.
Here's some free advice to help you land the right job and advance in your career - whether it's at FPA or somewhere else.
In addition to intrusions such as intended hacks - malware, ransomware, and phishing have been employed for some time now and remain a significant threat to the security of your information. In addition, many new forms of attacks are springing up every other day. With the
Our process for effectively addressing the security of a business’ information technology is based on the following three phased approach:
While securing information technology is as much an art as it is a science, it is also a constantly moving target. The over-arching and appropriate approach to security is to provide insight into the current status of risk, then reducing that risk by improving security measures where needed, and then by providing an ongoing methodology for a continuous review process.
Our TSRP incorporates the first two phases as noted above while the third phase, Securing and Addressing the Gaps (ie: Remediation), is the resulting action items from the project.
Performing a well-rounded information technology security assessment requires a multi-faceted approach evaluating (at the highest level) 3 key areas: policies, processes, and systems. To this end, our approach to an information technology security assessment can be broken down into the following assessment phases:
While all six phases are often required to ensure a thorough and exhaustive evaluation, not all organizations have the need for all six nor can they justify the evaluated ROI against the potential risk to perform each. Our tiered level approach to a security assessment allows us working with you to define the security assessment engagement specifically needed to meet your organization’s unique requirements.
In addition to reviewing and documenting your policies and procedures, technology infrastructure, and vulnerability test results, one of the key outcomes of the TSRP is to bring to light the level of information technology security as compared to industry standard requirements. The end result of our Security Assessment phase is reviewing all documentation gathered, analyzing the results, comparing them against industry standards, and providing the results in a meaningful report.
At the conclusion of the initial security assessment phase of the Technology Security Review Project, we will meet with you to deliver and review our findings, prioritize the action items (as to whether they are immediate or can be addressed over time), and discuss any recommended courses of action along with any related costs to address the issues.
FPA provides real, tangible, and meaningful results of this analysis in the form of detailed hard copy reports documenting all your organization's IT systems including: