TechValidate Research on Cortavo


Cortavo Case Study

Ohio Ministry Network

Introduction

This case study of Ohio Ministry Network is based on a September 2022 survey of Cortavo customers by TechValidate, a 3rd-party research service.

“It is nice having an outside eye on things and knowing that someone is managing the process.”

Challenges

The business challenges that led the profiled organization to evaluate and ultimately select Cortavo:

  • Their cybersecurity strategy prior to working with Cortavo was to use antivirus software, training, and spam tools
  • Prior to using Cortavo they did not have an IT services partner and they handled everything in-house
  • Prior to using Cortavo, the following aspects of their business would have been impacted if their data were to suffer a security event:
  • Servicing clients
  • Their reputation
  • Processing accounting tasks
  • Running their overall business

Preparedness of their company to deal with cybersecurity in the following areas BEFORE partnering with Cortavo:

  • Cyberattack prevention: somewhat prepared
  • Phishing attack prevention: somewhat prepared
  • Cybersecurity training for employees: somewhat prepared
  • Antivirus software: somewhat prepared
  • Dealing with spam email: somewhat prepared
  • Backup and recovery: poorly prepared

Use Case

  • The customer’s dark web scan results provided by Cortavo were somewhat serious and merited a response.
  • Cortavo deployed constant network monitoring, a cybersecurity platform, 24/7 help desk support, encryption, spam tools, antivirus software, and an entire cybersecurity infrastructure designed to keep data secure at Ohio Ministry Network.

Results

The surveyed organization achieved the following results with Cortavo:

  • Preparedness of their company to deal with cybersecurity in the following areas AFTER partnering with Cortavo:
    • Cyberattack prevention: prepared
    • Phishing attack prevention: prepared
    • Cybersecurity training for employees: prepared
    • Antivirus software: perfectly prepared
    • Dealing with spam email: prepared
    • Backup and recovery: prepared
  • How they feel about Cortavo keeping their network secure: Confident




About This Data

This data was sourced directly from verified users of Cortavo by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on Cortavo