Security Services

According to the Independent IT-Security Institute, almost 390,000 new malicious programs are detected every day.  These programs (malware) are no longer developed by script kiddies out to prove their skills but by professional cyber criminals and state–sponsored groups out for financial or political gain.  Security is no longer a “set and forget” technology, updates and constant fine-tuning are now required in order to ensure that optimal levels of protection are being delivered.

To assist our clients in navigating ever-evolving security technologies and maintaining a data security profile that aligns with security best practice and standards, K2 Services has introduced K2 Security Services.

K2 Security Services provides our clients with a set of affordable, targeted assessments of their data security.  Each assessment targets a unique segment of the client’s environment allowing for a phased deployment of remediation tasks.  Assessments are designed to be independent of one another and can be completed in any order allowing clients maximum flexibility with regard to time and budget.

K2 Security Services professionals work to ensure that the enhanced security services have a minimal effect on user productivity while helping to identify and address common security concerns.

Security Service Options

  • Help assess your current security position against industry best practices for security
  • Provide recommendations to help strengthen your security posture and minimize the chance of security breaches.
  • Review and Document the current state of your company’s infrastructure and controls.
  • Leverage K2’s expertise and solutions to provide a solid plan for closing security gaps quickly and efficiently.

A few examples are:

  • Assessment and development of IT Policy and Procedures for the management of your company (i.e. Asset Management, Media Storage and Disposal, Incident Management and Response)
  • Audit LAN/WAN technologies including WLAN
  • Test firewall rules and configurations
  • Review system logs, alerts and log collection setup
  • Audit Microsoft Windows environments (i.e. Active Directory, Patch Management, Group Policy Management…)
  • Review Cloud Computing Alternatives


  • Develop Business Continuity and Recovery Plans
  • Complete Risk Assessments and Business Impact Analyses’
  • Identify Critical Business Processes and Recovery Strategies
  • Determine speed of recovery necessary and develop recovery plans
  • Address the gaps in any plans
  • Maintain plans after initial launch through testing and review
  • Build IT-specific Disaster Recovery plans and services
  • Assess Physical Data Centers and Infrastructure Management

Recent News

February 1, 2023 in News, Press Releases

Managed IT Services Provider for the Legal Services Industry Announces New Journey as “K2 Services”

FOR IMMEDIATE RELEASE February 1st, 2023 – Post its formal separation, the legacy HBR Consulting’s IT, Managed Services, and Keno Kozie business is pleased to announce a relaunch, complete with a new name and renewed focus on providing the legal…
Read More
August 20, 2021 in Press Releases

Keno Kozie Experts to Speak at ILTACON 2021 Annual Conference

Executives from Keno Kozie to be on-site at booth #1628 and via the ILTACON virtual platform CHICAGO – AUGUST 18, 2021 – Keno Kozie Services LLC, a leading provider of information technology design, service and support to law firms and…
Read More

Creating a Smarter Law Firm

Learn More