Have a Question?
Click the tabs below to find information about our company and security
Pratum is always looking for talented information security and IT risk management professionals who are dedicated, hard working and looking for a challenge. If you are interested in employment with Pratum, a company who values you and your family, visit our careers page.
Pratum serves companies across the United States.
Because of our location in the Midwest, Pratum is able to keep rates extremely competitive. Many of our clients in larger cities have found it less expensive to utilize our services, even when we travel to their location.
Web Site Terms and Conditions of Use:
By accessing this web site, you are agreeing to be bound by these web site Terms and Conditions of Use, all applicable laws and regulations, and agree that you are responsible for compliance with any applicable local laws. If you do not agree with any of these terms, you are prohibited from using or accessing this site. The materials contained in this web site are protected by applicable copyright and trade mark law.
2. USE LICENSE
a. Permission is granted to temporarily download one copy of the materials (information or software) on Pratum, Inc.'s web site for personal, non-commercial transitory viewing only. This is the grant of a license, not a transfer of title, and under this license you may not:
i. modify or copy the materials;
ii. use the materials for any commercial purpose, or for any public display (commercial or non-commercial);
iii. attempt to decompile or reverse engineer any software contained on Pratum, Inc.'s web site;
iv. remove any copyright or other proprietary notations from the materials; or
v. transfer the materials to another person or "mirror" the materials on any other server.
b. This license shall automatically terminate if you violate any of these restrictions and may be terminated by Pratum, Inc. at any time. Upon terminating your viewing of these materials or upon the termination of this license, you must destroy any downloaded materials in your possession whether in electronic or printed format.
The materials on Pratum, Inc.'s web site are provided "as is". Pratum, Inc. makes no warranties, expressed or implied, and hereby disclaims and negates all other warranties, including without limitation, implied warranties or conditions of merchantability, fitness for a particular purpose, or non-infringement of intellectual property or other violation of rights. Further, Pratum, Inc. does not warrant or make any representations concerning the accuracy, likely results, or reliability of the use of the materials on its Internet web site or otherwise relating to such materials or on any sites linked to this site.
In no event shall Pratum, Inc. or its suppliers be liable for any damages (including, without limitation, damages for loss of data or profit, or due to business interruption,) arising out of the use or inability to use the materials on Pratum, Inc.'s Internet site, even if Pratum, Inc. or a Pratum, Inc. authorized representative has been notified orally or in writing of the possibility of such damage. Because some jurisdictions do not allow limitations on implied warranties, or limitations of liability for consequential or incidental damages, these limitations may not apply to you.
5. REVISIONS AND ERRATA
The materials appearing on Pratum, Inc.'s web site could include technical, typographical, or photographic errors. Pratum, Inc. does not warrant that any of the materials on its web site are accurate, complete, or current. Pratum, Inc. may make changes to the materials contained on its web site at any time without notice. Pratum, Inc. does not, however, make any commitment to update the materials.
Pratum, Inc. has not reviewed all of the sites linked to its Internet web site and is not responsible for the contents of any such linked site. The inclusion of any link does not imply endorsement by Pratum, Inc. of the site. Use of any such linked web site is at the user's own risk.
8. GOVERNING LAW
Any claim relating to Pratum, Inc.'s web site shall be governed by the laws of the State of Iowa without regard to its conflict of law provisions.
Personal identification information
We may collect personal identification information from Users in a variety of ways, including, but not limited to, when Users visit our site, subscribe to the newsletter, fill out a form, and in connection with other activities, services, features or resources we make available on our Site. Users may be asked for, as appropriate, name, email address, mailing address, phone number. Users may, however, visit our Site anonymously. We will collect personal identification information from Users only if they voluntarily submit such information to us. Users can always refuse to supply personally identification information, except that it may prevent them from engaging in certain Site related activities.
Non-personal identification information
We may collect non-personal identification information about Users whenever they interact with our Site. Non-personal identification information may include the browser name, the type of computer and technical information about Users means of connection to our Site, such as the operating system and the Internet service providers utilized and other similar information.
Web browser cookies
How we use collected information
Pratum, Inc. may collect and use Users personal information for the following purposes:
- To improve customer service Information you provide helps us respond to your customer service requests and support needs more efficiently.
- To improve our Site We may use feedback you provide to improve our products and services.
- To run a promotion, contest, survey or other Site feature To send Users information they agreed to receive about topics we think will be of interest to them.
- To send periodic emails We may use the email address to send User information and updates pertaining to their order. It may also be used to respond to their inquiries, questions, and/or other requests. If User decides to opt-in to our mailing list, they will receive emails that may include company news, updates, related product or service information, etc. If at any time the User would like to unsubscribe from receiving future emails, we include detailed unsubscribe instructions at the bottom of each email or User may contact us via our Site.
How we protect your information
We adopt appropriate data collection, storage and processing practices and security measures to protect against unauthorized access, alteration, disclosure or destruction of your personal information, username, password, transaction information and data stored on our Site.
Sharing your personal information
We do not sell, trade, or rent Users personal identification information to others. We may share generic aggregated demographic information not linked to any personal identification information regarding visitors and users with our business partners, trusted affiliates and advertisers for the purposes outlined above.
Third party websites
Users may find advertising or other content on our Site that link to the sites and services of our partners, suppliers, advertisers, sponsors, licensors and other third parties. We do not control the content or links that appear on these sites and are not responsible for the practices employed by websites linked to or from our Site. In addition, these sites or services, including their content and links, may be constantly changing. These sites and services may have their own privacy policies and customer service policies. Browsing and interaction on any other website, including websites which have a link to our Site, is subject to that website's own terms and policies.
Compliance with children's online privacy protection act
Protecting the privacy of the very young is especially important. For that reason, we never collect or maintain information at our Site from those we actually know are under 13, and no part of our website is structured to attract anyone under 13.
Your acceptance of these terms
Pratum performs ethical phishing tactics to reveal potential vulnerabilities an organization has to real attacks. These phishing techniques help organizations understand the proper training methods, which need to be implemented to help educate employees. Pratum phishing attacks are a safe way to test an organization's employee security methods and prepare it for real threats and malicious attacks.
Without proper training, an employee can unknowingly open an email and click a link that can expose an organization’s confidential information. This process is called Phishing.
Phishing - the practice of luring unsuspecting Internet users to a fake Web site by using authentic-looking email with the real organization's logo, in an attempt to steal passwords, financial or personal information, or introduce a virus attack; the creation of a Web site replica for fooling unsuspecting Internet users into submitting personal or financial information or passwords (dictionary.com)
A firewall is either a software or hardware appliance that acts as a gatekeeper of data being sent between two different networks (Usually a Local Area Network and the Internet). They work by allowing the user to set certain “rules” for both incoming and outbound traffic involved with the data transfer. A firewall is a great asset to any computer user because it can effectively block any malicious attacks coming in, and also control what kind of information is being sent out by the computer.
I am constantly getting reminders to download and install new updates for my computer, Is this necessary and how often should I do this?
Updates, especially Operating System and Anti-Virus updates, are very important to the well-being of a user’s computer. Updates are used to improve current software so that it is both more secure and also more robust in features for its users. If updates aren’t kept up with at a fairly current pace, the chances of an attack on the computer increase along with the chances of the attack being successful. As a good practice, it is often recommended to turn the Automatic Updates function on for all programs that allow it. This takes the burden off the user to check for updates and allows the computer to stay up to date with all important patches and fixes.
I am worried about losing important information off my computer due to a potential unexpected crash or loss of data, How should I avoid that risk?
The best practice for avoiding catastrophic data loss is to back up your information and to back it up regularly.Many people never think to back up their data, and can very quickly lose their computerized financial records, music, pictures, and other valuable information stored on their computer’s hard drive. Now, it is easier than ever to back up your important files to a secure location. Choices for where to back up could include a flash drive, DVD, portable hard drive, cloud based storage, or some other convenient location. Using one of these mediums to create a copy of your important data should leave you feeling more confident about the security of your significant files.
My computer does not currently have an Anti-Virus/Anti-Malware protection program installed, Do I need one for my computer?
Yes! With the current influx of new viruses and exploits online, all computer users need some type of protection software for their computers. Even mobile devices such as smartphones and tablets are at risk. Anti-Virus software not only notifies you when you have possibly contracted a computer virus or piece of spyware, but also tries to proactively block the threat before it strikes. Having this software installed is a key way to prevent data loss stop the spread of malicious software.
I have heard a lot about online “phishing” recently, what is “phishing” and how do I prevent myself from falling victim to it?
Phishing is a technique used by online perpetrators and thieves to trick a user into giving up their personal information through some kind of fake website, email, or program. Generally, these phishing attempts mimic trusted sites to seem real, and then ask for information a trusted website would usually ask its users for. To prevent falling victim to one of these scams, there are a few rules of thumb to always follow. First, if some kind of offer seems too good to be true, it probably is, and is only an attempt to force you to compromise your personal information. Second, always remain skeptical of any suspicious emails you receive or websites you visit. If you experience anything odd or out of the ordinary, there is a good chance the website/email is bogus. By following these simple practices and always being an informed user, phishing attempts can be easily avoided.
Use more than 8 characters (More Characters = Stronger Passwords) Include random characters within the password (#, @, %, $, etc.) Use both upper and lower case characters (i.e. – AbCdeF) Avoid using “dictionary” words or stereotypical passwords such as “dog”, “red”, or “password” Avoid using important dates or other meaningful information in your password Try using a passphrase instead of a password .“I8burger4d!NER” (I ate burger for dinner) By following these simple password creation practices, a user should be able to guarantee greater piece of mind when saving valuable information to an online location.
If at all possible stop using the systems which you believe has been compromised. It could be used as a launch pad for additional attacks within your network. If you believe there has been financial loss to your organization you should report the intrusion to your local authorities. They will help determine which agencies should be involved in the investigation. Whether or not you choose to report the attack to law enforcement you should contact a reputable digital forensics investigator to determine how the attack occurred, the extent of damage and provide a plan for avoiding similar attacks in the future.
In most cases data can be recovered even after it has been deleted by the user. The area of a drive where deleted data resides is marked as free space. The deleted data remains in that space until the operating system overwrites it with new data. Sometimes this deleted data will remain on a drive for the life of that drive.
Vulnerability scanning is a non-invasive process which interrogates a device or application to determine if it is running software or has a configuration which has a known weakness. This weakness is not exploited in a vulnerability scan. A penetration test will actually attempt to exploit a weakness to determine what if any damage can be done. While both can be automated, penetration testing is a more complicated process.