PalmTech Computer Solutions

Submit a Support RequestContact Us

1025 N. Florida Mango Rd.
Suite 5 West Palm Beach, FL 33409
United States

(561) 969-1616

Get Directions

PalmTech Enhanced Security

Why choose PalmTech?

Since our establishment in 2003, we have fixed numerous IT issues that have plagued businesses in Florida. And considering the many different problems we’ve encountered, it’s not unreasonable to think that still a large majority of businesses are victims of external and internal cyberattacks. To address this, we offer our all-inclusive package -- PalmTech Enhanced Security.


Enhanced Security



An annual security scan will be performed to identify any gaps. The scope of the assessment includes external and internal networks, printers, servers, workstations, mobile devices, and infrastructure present at that moment in time. You will receive an objective multi-page assessment report based on the findings, taking into consideration your unique business objectives. The report will highlight sources, findings, best practices, and recommendations to mitigate any identified issues.

Up to 25 users


per month

it support agency


Online training portal with slides, text, and videos. Employees take security quiz and print out a certificate. Admin will have a record of all training statuses. Also includes ongoing security tips and reminders.

Employee Phishing: Send fake phishing emails to employees to improve their ability to spot and avoid a real phishing email.

Security Policies: Best practices for securing critical data.

Reporting and Repository: Insight into employee training. Repository for all your security information.

26-50 users


per month

it security solutions

Alerts for

Proactive monitoring for your organizations stolen or compromised data and real-time alerts when data is discovered. Dark Web ID combines human and sophisticated Dark Web intelligence with search capabilities to identify, analyze and proactively monitor for your organization’s compromised or stolen employee and customer data.

51-100 users


per month


Zero Trust Framework

Hacker generally uses attacks designed to bypass authentication as a primary method of gaining entry to your network or PC. Once inside, they install tools in continue penetrating the layers of your network and devices. One of the best ways to stop this is by utilizing MFA (Multifactor Authentication). In its most basic form we set up a secondary device, such as a mobile phone, to generate a second token or password to make unauthorized access much more difficult. If a hacker were still somehow able to log in, we utilize a second layer of protection that prevents any unapproved applications from being executed or installed on a PC. We are also alerted to any attempt to install an unauthorized application.

+101 users


per month

cyber crime insurance company

Cyber Crime Insurance

Even with strong cybersecurity practices, a robust training program, and multiple layers of control, a security breach can still occur. As an added benefit we have included $250,000 in Cyber Liability coverage. In the event you are the victim of Cyber Crime this policy will provide a number of benefits including:

  • Regulatory Penalties and Fines (HIPAA, PCI, NY DFS, GDPR and more)
  • Ransomware payments
  • Telecommunications Theft
  • Social Engineering Fraud
  • E-Theft
  • PCI re-certification
  • Crisis management and fraud prevention expenses (call centers, credit monitoring, notification)
  • Forensics
  • Legal Expenses
  • And More!

*Limits apply, see policy for details. Policy underwritten by A+ rated Axis Capital.


per month