icon picker
Cybersecurity Essentials Explained

A practical, focused cybersecurity service built around essential protections.
Cybersecurity Essentials is Rooted Software’s streamlined cybersecurity service designed to deliver a focused set of critical protections that every organization should have in place. Most of what is required from you is to attend monthly meetings—we'll take care of almost everything else as a service on your behalf. We’ve selected a basic set of security measures we consider essential for foundational cybersecurity hygiene, ideal for teams that want to reduce risk, meet modern security expectations, and improve their security posture with minimal disruption. We’ll deliver practical protections, clear documentation, and meaningful improvements—all without the burden of complexity, compliance-heavy tooling and the costly onboarding required for them.

Why isn’t this already part of our Managed IT package?

At Rooted, we’ve built our Managed IT services to deliver on strong best practices. We manage infrastructure with security in mind and do our part to protect your systems as part of regular support. But Managed IT alone isn’t enough to build a defensible, organization-wide security posture.
That’s because comprehensive cybersecurity is about more than technology. It’s about policies, people, accountability, and continuous improvement across the whole organization. And while we absolutely care about security in all we do, services like:
User security awareness training
Formalized, documented security improvement plans
Proactive insurance readiness
Consistent tracking of cybersecurity objectives
...go beyond the scope of traditional help desk and systems support. They require extra time, different tools, and focused engagement.
Cybersecurity Essentials is our answer for organizations who want those things, but in a simple, lightweight, low-lift format.

What You Get with Cybersecurity Essentials

We focus on the essential, foundational elements of modern cybersecurity. Rather than implementing a complex security framework, we focus on the practical steps that every organization should take to reduce risk and improve protection.

1. Establish Security Awareness Training for Your Team

We deploy Huntress Security Awareness Training, a well-designed platform that empowers your team to avoid the most common attack vectors—like phishing, weak passwords, and social engineering. We've researched and selected this platform as the best cybersecurity training solution available. It's the same one we use within our own organization, and we really believe in it. The training is short, engaging, and delivered monthly. It helps reduce the single largest source of risk in most organizations: human error. We manage deployment and tracking to make it hands-off for you.

2. Facilitate Cybersecurity Insurance Acquisition

Choosing the right cybersecurity insurance can be tedious to navigate—and finding the right policy for your organization requires more than a quick Google search. That’s why we we interface with a trusted cybersecurity insurance consultant (the same one we use for our own policy) to locate the best fit for you. We’ll tailor policy options to your specific organization based on your market, infrastructure, budget, and regulatory landscape. We’ll present everything in a clear, side-by-side comparison, guide you through the decision, and make sure the process is as simple as possible for you. All that’s required from you is to show up, provide a few answers, and sign the deal that’s right for you. Rooted will:
Gather and organize policy options tailored to your business, market, infrastructure, and risk profile
Liaise with our trusted cybersecurity insurance consultant
Present your options in a clear comparison and lead a focused consultation to help you choose
Handle the process from start to finish so you only need to participate in a maximum of 2 short meetings

3. Monthly Consultation & Essential Security Work

Many SMB-sized organizations don’t have ample time to dedicate to a cybersecurity compliance program—that’s why most of what’s required from you for Cybersecurity Essentials is to show up to the meeting. We’ll take care of almost everything else as a service on your behalf.
We provide consistent consultation and support to move your organization toward a secure baseline. Instead of implementing a complex security framework and using compliance-heavy tooling—we focus on a curated list of practical, high-impact actions from the Center for Internet Security (CIS) framework. These are tasks that don’t require complex software like Cyrisma or deep internal audits, but still meaningfully reduce risk. We’ll use a simple shared Asana project, pre-loaded with our plan, to track progress in a transparent and collaborative way.
Each month contains:
90 minutes of direct consultation with our security advisor to guide strategy, answer questions, and discuss the progress we've made since our last meeting.
The behind-the-scenes work necessary for our team to implement updates, harden configurations, and make measurable progress for you. Over the duration of the contract we’ll draw from a clear, achievable list of security actions, such as:
Implementing computer policies to strengthen your security posture and block common threat vectors
Using built-in benchmarks and configuration analysis to identify vulnerabilities across your IT environment
Continuously updating your defenses with adaptive suggestions to counter emerging risks
Helping your team use strong passwords and enable multi-factor authentication for secure logins
Ensuring only the right people have access to sensitive systems and remove unnecessary permissions
Reviewing user accounts regularly to clean up unused or excessive access
Securing how your team connects to work remotely
Keeping an up-to-date inventory of the computers, software, and tools your organization uses
Installing and maintain essential protections like antivirus, endpoint security, and reliable backups
Providing clear, easy-to-follow policies for how staff should use company technology responsibly
Identifying potential security risks and address them before they become problems
Following consistent, proven steps aligned with industry best practices to stay organized and secure
Scanning your networks for vulnerabilities both inside and outside
Keeping your network hardware, computers, and software up to date and properly configured to reduce vulnerabilities and improve resilience
This approach lets us improve your security posture in a consistent, manageable way—without burdening your team, requiring complex tooling, or asking you to do anything beyond showing up to the meetings.

Who Cybersecurity Essentials Is For

You want your organization to be more secure, but you don’t have compliance requirements or the bandwidth for an intensive program. You want:
Less risk from your people, tools, and processes
Guidance on insurance or partner security questions
Clear action items tracked over time
Confidence that progress is being made
Cybersecurity Essentials gives you that.
Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
CtrlP
) instead.