800-214-0957 info@blackbottleit.com

FAQ

FAQ

Frequently Asked Questions

Black Bottle IT answers your top cybersecurity questions — from MFA to ransomware, compliance, and how we protect your business. Get the answers you need to keep your business safe.  Then, jump over to Ask the Experts for more information sharing!

About Black Bottle IT’s Services

What does a Cyber Risk Assessment actually involve, and how long does it take?

Cyber Risk Assessment with Black Bottle IT is a thorough evaluation of your entire IT environment — networks, systems, applications, devices, and user behaviors. We identify vulnerabilities, assess potential threats, and deliver a prioritized action plan with continuous monitoring recommendations. Depending on the size and complexity of your organization, the initial assessment typically takes one to two weeks.

What is the difference between Managed IT and Cybersecurity services?

Managed IT covers the day-to-day operations of your technology infrastructure — keeping systems running, managing updates, and supporting your team. Cybersecurity services focus specifically on protecting your organization from threats, breaches, and data loss. Black Bottle IT offers both, and when integrated, they provide a seamless, defense-in-depth approach that keeps your business both operational and secure.

Do you offer cybersecurity services for small and mid-sized businesses, or only large enterprises?

Absolutely — in fact, small and mid-sized businesses are among the most at-risk organizations because attackers know they often have fewer defenses. Black Bottle IT works with businesses of all sizes, tailoring our solutions to fit your budget and risk profile. You don’t need an enterprise budget to get enterprise-grade protection.

What industries do you serve?

We serve a broad range of industries, including healthcare (physician and dental practices), manufacturing, professional services, defense contractors, financial services, and nonprofits. Each sector faces unique compliance requirements and threat landscapes, and our team has the expertise to address them. If you’re unsure whether we’re a fit for your industry, reach out — we’re happy to talk through your specific needs.

What is vendor monitoring, and why does it matter?

Your cybersecurity is only as strong as your weakest vendor. Vendor monitoring means we continuously assess the security posture of the third-party companies that have access to your data or systems. A breach at a vendor can become your breach — vendor monitoring closes that gap.

How We Work

How do we get started with Black Bottle IT?

The first step is a complimentary security consultation. One of our experts will sit down with you to understand your current environment, your biggest concerns, and your compliance requirements. From there, we typically recommend starting with a Cyber Risk Assessment so we have a clear picture of where you stand before recommending solutions.

What happens after a Cyber Risk Assessment is completed?

You receive a detailed report that outlines the vulnerabilities we found, the level of risk they present, and a prioritized roadmap for addressing them. We don’t just hand you a report and walk away — we partner with you to implement the recommendations, monitor progress, and adjust your security posture as threats evolve.

Do you provide 24/7 support?

Our standard business hours are Monday through Friday, 8:30 a.m. to 5 p.m. However, we maintain a 24/7 Breach Hotline (800-214-0957 x700) so that if you suspect a breach at any hour, you can immediately reach a cybersecurity analyst who will help quarantine and mitigate the threat.

How does Black Bottle IT's employee cybersecurity training work?

Our training is designed to be practical and non-disruptive. We use 10-minute modules covering topics like phishing recognition, ransomware awareness, and safe data handling practices. We can also run simulated phishing campaigns to test how your team responds in real-world scenarios. Training is one of the highest-ROI investments a business can make — most breaches involve human error.

Can Black Bottle IT help if we've already experienced a breach?

Yes. Call our Breach Hotline immediately at 800-214-0957 x700. Our team will work quickly to contain the damage, identify how the breach occurred, and remediate the vulnerability. After the incident is resolved, we’ll also help strengthen your defenses to reduce the likelihood of a repeat event.

What compliance frameworks does Black Bottle IT support?

We help organizations achieve and maintain compliance with CMMC (Cybersecurity Maturity Model Certification), SOC 2, PCI (Payment Card Industry), and the NIST Cybersecurity Framework. Each of these serves a different purpose — CMMC is critical for DoD contractors, SOC 2 for service organizations handling customer data, and PCI for any business processing credit card payments.

Compliance

What compliance frameworks does Black Bottle IT support?

We help organizations achieve and maintain compliance with CMMC (Cybersecurity Maturity Model Certification), SOC 2, PCI (Payment Card Industry), and the NIST Cybersecurity Framework. Each of these serves a different purpose — CMMC is critical for DoD contractors, SOC 2 for service organizations handling customer data, and PCI for any business processing credit card payments.

We're a manufacturer working with the Department of Defense. Do we need CMMC?

If you handle Federal Contract Information (FCI) or Controlled Unclassified Information (CUI), CMMC compliance is mandatory — and the clock is ticking. Without certification, you risk losing eligibility for DoD contracts entirely. Black Bottle IT can assess your current posture, develop a compliance roadmap, and guide you through third-party certification.

How long does it take to become compliant, and what does the process look like?

Timelines vary based on your starting point and the framework involved. Some organizations can achieve a solid compliance footing in a few months; others with more complex gaps may take six to twelve months. We begin with a gap analysis to understand where you are versus where you need to be, then build a practical, phased roadmap so you’re always making measurable progress.

Trends & Threat Landscape

What are the most common cybersecurity threats facing businesses right now?

Ransomware, phishing, business email compromise (BEC), and supply chain attacks remain the top threats for small and mid-sized businesses. Attackers are also increasingly using AI to craft more convincing phishing emails and automate attacks at scale. The good news is that a layered security strategy — combining monitoring, training, strong authentication, and an incident response plan — addresses the vast majority of these threats.

How is AI changing the cybersecurity landscape, and how does Black Bottle IT address it?

AI is a double-edged sword. Attackers are using it to generate more convincing phishing lures, accelerate vulnerability scanning, and automate attacks. At the same time, our team leverages AI and automation to monitor threats in real time, detect anomalies faster, and respond more quickly than ever before. Staying ahead means combining cutting-edge tools with experienced human judgment — which is exactly how our team operates.

How are attackers using AI against businesses, and what should we be doing about it?

Artificial intelligence has become a tool of choice for cybercriminals. They use it to craft highly personalized phishing emails that are nearly indistinguishable from legitimate communication, to automate vulnerability scanning across thousands of targets simultaneously, and even to generate deepfake audio and video for impersonation scams. The response isn’t to panic — it’s to ensure your defenses are equally sophisticated. That means AI-assisted threat monitoring, rigorous employee training on evolving tactics, and working with a cybersecurity partner who stays current with the threat landscape so you don’t have to.

What is social engineering, and how do attackers use it against businesses?

Social engineering is the art of manipulating people into giving up information or access they shouldn’t. Rather than hacking systems, attackers hack people — impersonating executives, IT staff, or vendors to trick employees into wiring money, resetting passwords, or clicking malicious links. Business Email Compromise (BEC) alone cost businesses billions of dollars last year. Employee training and strong verification procedures are the most effective defenses against these tactics.

What is a supply chain attack, and how does it affect my business?

A supply chain attack happens when cybercriminals compromise a vendor, software provider, or partner that has access to your systems — and use that trusted relationship as a backdoor into your environment. The infamous SolarWinds attack is a high-profile example, but these attacks happen at every level of the business world. This is why vendor monitoring is a critical part of a comprehensive cybersecurity strategy, not an optional add-on.

Office

7000 Stonewood Drive, Suite 222
Wexford, PA 15090

Hours

M-F: 8:30 am – 5 pm
Breach Hotline 24×7

Call Us

800-214-0957 (main)

800-214-0957 x700 (breach hotline)