What Longsword security is all about
Longsword Security was founded on the Gospel of Jesus Christ, inspired by the church body we are a part of, and we hold the values found in the Bible critical to daily life. This means that Longsword will hold itself accountable to be honest and open, to be true and treat its customers and employees with grace, and to do right by everyone to the best of our ability.
Longsword Security’s name was chosen as a reference to the Sword of God, or God’s Word. Ephesians 6:17 refers to the “…sword of the Spirit, which is the Word of God.”, which is part of the full Armor of God, which will enable us to stand our ground against evil. In our case, a sword allows us to protect ourselves from harm or attack and overcome the enemy before us - the sin we all struggle with daily.
The sword is both an offensive and defensive weapon, and we at Longsword are taking that philosophy to cybersecurity. Offensively, we take proactive steps to keep you secure. Defensively, we respond to events in a timely manner and with the care and attention to detail that you expect from cybersecurity experts all over the world.
Hebrews 4:12 - “For the Word of God is living and active, sharper than any two-edged sword, piercing to the division of soul and of spirit, of joints and marrow, and discerning the thoughts and intentions of the heart.”
While we can never be as sharp as the Sword of the Spirit, we will strive daily to be an exceptional cybersecurity company and disciples of the Word of God.
How it works
-
We get on a video call (don’t worry, you don’t have to have your camera on), get to know you and introduce ourselves. We go over what you have in place right now, discuss our options, and answer any questions.
-
If we are a good fit to help secure your business, you let us know and we exchange information (this is the boring part). Once all the paperwork is done, we get to go to onboarding!
-
You or your whole team (you choose) will get a link to an installer. Download and install! Each user will receive their Gap Analysis email, a quick 10 minute quiz to evaluate their cybersecurity weaknesses and deploy the first round of training. We will coordinate a time with an administrator of your email to get the email filter setup.
-
You are done and our team takes over. We evaluate the machines that are now being monitored for vulnerabilities, deploy our MDR (Managed Detection & Response) tool to keep a sharp eye out, and make sure that trainings were properly deployed. Reports are prepared so that you can see how things are going, and we confirm the timing and recipients for reports.
-
We are now operational. If you need help, you can always reach out by email.