Connecticut Information Security is a full-service Cyber Security Firm
We specialize in identifying security risks, protecting client networks, and aligning organizations with security standards.

PROTECT YOUR BUSINESS.
MITIGATE YOUR RISKS.
Dealing with security attacks has become a fact of doing business online. With the introduction of regulations to protect data, this has become a critical area for businesses today.
Know your risks. Protect your data. Become compliant.
Popular Offerings

IT Security Healthcheck
Find gaps and take action with a custom assessment that meets your needs and budget. Learn More

NARC® Deception Technology
Identify internal compromise and malicious insiders quickly and without false positives. Learn More
Services
CTInfoSec has extensive experience performing security assessments in a variety of industries including insurance, financial services, mobile applications, healthcare, online services, manufacturing, utilities, real estate, business services, and more. It is our focus on the uniqueness of each client that allows us to create a lasting impact and superior output.

Recent Blog Posts
-

Consumer VPNs: Separating Fact from Fiction
Read more: Consumer VPNs: Separating Fact from FictionOrganizations consist of numerous consumers. In our business, we interact with both businesses and the individuals within them who are keen on protecting their data in every possible way. One common question we encounter is, “Are consumer VPNs necessary?” Over the past few years, consumer VPNs have surged in popularity, with major companies frequently advertising…
-

Mitigating Supply Chain Risks: The Importance of Vendor Security Assessments
Read more: Mitigating Supply Chain Risks: The Importance of Vendor Security AssessmentsAs a society, we have come to depend on vendors and managed service providers to assist in business functions ranging from trivial to critical. These services we rely on support internal functions, client services and ultimately help companies grow and operate. Therefore, the importance of the security surrounding each solution should not be understated. However, …
