CounterAct Cybersecurity Group Launches End-to-End Approach to Help MSPs Protect Their Businesses and Customers from Information Security Threats

Share Article

Unique, systematic process includes security risk and maturity assessment, threat detection and response, training and information security program management, and MSP to s-MSP Transformation services.

CounterAct Cybersecurity Group

CounterAct Cybersecurity Group

Cybersecurity used to be an after-thought for many MSPs. Owners would cross their fingers and hope their businesses would be overlooked by the cybercriminals, hacktivists and other malicious information security threat actors that lurk in the shadows waiting to strike.

Today marks the debut of CounterAct Cybersecurity Group’s suite of cybersecurity solutions aimed at helping managed service providers (MSPs) better defend themselves and their customers from increasingly sophisticated and damaging information security threats.

CounterAct’s proven end-to-end MSP cybersecurity process begins with a thorough assessment of the MSP’s own security risk and maturity to help its arm itself with the facts before moving to the design and implementation of vendor-neutral threat detection solutions. The CounterAct suite of solutions also includes incident response and remediation services as well as training, consultation and information security program management.

In addition to the above cybersecurity services, the CounterAct MSP to s-MSP Transformation program offers MSPs the opportunity to earn CounterAct’s coveted Secure MSP (s-MSP) stamp of approval. Undertaking this rigorous, third-party process demonstrates an s-MSP’s commitment to protecting itself from cybersecurity risk and reduces the risk that threat actors will leverage the MSP as a pathway to customers’ networks and critical data. The CounterAct s-MSP designation also thoroughly prepares MSPs to successfully develop operationalize and monetize cybersecurity solutions for their own customers either white-labeled through CounterAct or with their own brand.

“Cybersecurity used to be an after-thought for many MSPs. Owners would cross their fingers and hope their businesses would be overlooked by the cybercriminals, hacktivists and other malicious information security threat actors that lurk in the shadows waiting to strike,” said George Mach, President and CEO of CounterAct and a Certified Information Systems Security Professional (CISSP). “Today this is an extremely dangerous position to take, especially with MSPs regularly targeted as easy points of entry into their customers’ networks and sensitive data.”

Mach said the decision to launch CounterAct grew from his own experience as the owner of Apex IT Group, an MSP that he founded in 2007, as well as his ongoing engagement with the National Institute of Standards and Technology (NIST) National Cybersecurity Center of Excellence (NCCoE) community, which is focused on MSPs and small- and medium-size businesses. CounterAct also has alliances with other leading cybersecurity organizations, including the Center for Internet Security (CIS).

“As the owner of a thriving and nationally recognized MSP, I understand the real-world challenges and resource limitation that my peers are up against when it comes to successfully addressing complicated and increasingly sophisticated information security threats. Unfortunately, they far too often rely on ‘cybersecurity in a box’ solutions. The fact is that one-off, over-the-counter cybersecurity products without a clear understanding of their MSP’s risk and a strategy to address that risk makes their businesses more vulnerable to a cyber breach. With CounterAct as their ally, they don’t have to go it alone. We understand MSPs, we know what it takes to secure their businesses, and we have the expertise to help them leverage cybersecurity services to grow revenues and increase their value as their customers’ trusted advisor,” said Mach.

CounterAct’s suite of solutions and services include:

  • CounterAct Intelligence Gathering: Business Impact Analysis, Information Security Risk Assessment, Vulnerability Assessment, Penetration Testing, Application Security Assessment, Security Maturity Assessment, and Security Roadmap Development
  • CounterAct Security Ops Command: Information Security Management Program Development; Development and Deployment of Information Security Policies and Procedures; Designing and Implementing Security Controls; System Hardening and Continuous Maintenance; Security Awareness Training; Data Protection, Recovery and Continuity Solutions; Managed Threat Detection, Analysis and Response Solutions; and Incident Response and Recovery Solutions.
  • CounterAct Train, Advise & Manage: Dedicated Chief Information Security Officer (CISO); Governance, Risk and Compliance Advisory Services; Information Security Program Management, Quality Assurance and Continuous Improvement Services; Cybersecurity Playbook Management, including operational best practices and standard operating procedures; Cybersecurity Workforce Training; and Certifications for Cybersecurity Professionals.
  • CounterAct MSP to s-MSP Transformation: s-MSP Security Maturity Index Assessment, s-MSP Information Security Management Program Development, and MSP to s-MSP System – The Complete Guide to Building Your s-MSP.

CounterAct is showcased this week in Tampa, Fla., at PerchyCon 2020, a cybersecurity conference for MSPs, where Mach will be serving as a member of the “Risk Assessment and Compliance” panel on Jan. 31 at 2 p.m. To learn more about CounterAct, which also provides cybersecurity solutions for regulated and other security-conscious businesses, visit

About CounterAct Cybersecurity Group
CounterAct Cybersecurity Group provides managed IT service providers, regulated businesses and security-conscious companies with a disciplined, systematic, holistic approach to protect themselves and their customers from information security threats. Using highly qualified cybersecurity experts, CounterAct helps organizations go on the offensive by assessing security risk and maturity, designing and implementing tailored threat detection and response solutions, delivering incident response and remediation services, and providing training and consultation via a fractional Chief Information Security Officer (CISO) who efficiently manages information security programs and compliance requirements. For more information, please visit

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Diane Rose
DKR Communications
+1 727-238-7567
Email >
Visit website