WE ARE BROADTEK.

Broadtek is a premier provider of advanced technology services, network design, implementation, and maintenance services.

WATCH

View the films to learn more.

DISCOVER

Broadtek can give your business the tools it needs to engage clients and the consumers of your products and services unlike any other technology company in the industry.

EXPLORE OUR STORIES

SERVICES

Broadtek offers a wide-range of technology services to meet our customer needs. We partner with the leading vendors to bring our clients the best solutions.

NETWORKING

Businesses continue to depend upon stable interconnectivity. Broadtek designs and implements reliable network solutions to help increase your productivity.

READ MORE

CLOUD

Business is transforming as a result of the revolution in connectivity. Broadtek provides reliable cloud solutions with cost-effective and scalable hosted services.

READ MORE

COMMUNICATION

The increase in bandwidth requirements drives businesses to re-evaluate their current voice and data services. Broadtek partners with over 40 carriers to research and deliver appropriate connectivity options for our clients.

READ MORE

COLLABORATION

Broadtek's collaboration solutions include a unified platform for voice, video and IM. We can design a solution to help accomplish your business objectives.

READ MORE

SECURITY

We provide security solutions that adapt to the ever-changing threat landscape. This proactive response assures that critical data is shielded from exploits.

READ MORE

HARDWARE / SOFTWARE

Companies still rely on hardware and applications to facilitate tasks. Broadtek installs practical systems, provides software licensing along with support options.

READ MORE

VIRTUALIZATION

Today's businesses require efficient and scalable core technology operations. Virtualization provides for consolidation of the physical infrastructure giving IT environments reduced total cost of ownership.

READ MORE

MANAGED

We have a variety of managed service offerings to keep your company secure. This allows you to focus on running your business, not your technology.

READ MORE

Broadtek has been our partner through substantial growth over the last few years. Their advice and expertise has helped to ease the growing pains and achieve our IT goals.

LARRY WAGNERIT Director, Community Counseling Center

OUR PARTNERS

  • Client 1
  • Client 2
  • Client 3
  • Client 4
  • Client 5
  • Client 6
  • Client 7
  • Client 8

MEET OUR TEAM

  • MATT HOPKINS

    Director of Sales & Marketing
  • DONNIE LAWSON

    Director of Technical Services
  • ELLEN KIRCHDOERFER

    Director of Operations
  • MONIQUE COLEMAN

    Account Manager
  • GAVIN THOMAS

    Inside Sales Representative
  • JEFF HAY

    Account Manager & Telecom Specialist

Broadtek has always been a great company to do business with and their technical staff is second to none. We have used their expertise on several projects over the years, but the one that stands out recently is our conversion to virtual. Their staff knew exactly what was needed and made the process seem easy.

SKIPPER COWANIT Manager, The Bank of New Madrid

CONNECT

2017
Security
Scam of the Week: DocuSign Phishing Attack At Broadtek, we strive to keep our customers aware of all potential phishing attacks in the news. This week we are looking at the DocuSign attack. DocuSign has admitted they were the victim of a data breach that has led to massive phishing attacks which used ex-filtrated DocuSign information.
Read More
Security
Employees are your last line of defense and need to become an additional security layer when (not if) attacks make it through all your technical filters.
  1. Ransomware heads the list of deadly attacks
SANS' Ed Skoudis said the rise in ransomware was the top threat. “We’ve seen this can bring down a whole network of file servers and we expect many more attacks”. His advice is that companies practice network security “hygiene” and limit permission for network shares to only those jobs that require it. And of course train your users within an inch of their lives. 
Read More
Uncategorized
  1. Agents broker deals for clients - When you work with a direct representative from XYZ telecom company, that person has a vested interest in selling you only their product. Working with an agent allows you to receive advice and guidance from competitive carriers. This ultimately provides you with the best price and solution for your specific situation
Read More
Security
We have long known that People are the weakest link in security. Organizations today realize they can have the best security technology money can buy, but if one employee clicks a link or downloads an attachment from an email, all that security gets thrown out the window. Organizations are beginning to provide more training and education to their employees to help ensure everyone is doing their part to prevent attackers from gaining access to our networks and stealing our information.

Testing Your People

There’s one caveat to more training and education: how do you know if it is working? The answer is to test your People. We already test our Technology via Vulnerability Assessments and Penetration Tests. Most organizations are required to test their Processes (typically an annual IT Audit). But if we know that People are our weakest link, shouldn’t we be testing our People at least as much, if not more, than our Technology and Processes?

Creating a Culture of Security

Testing your People is not difficult, but it’s only half the battle. The difficult part comes after individuals fail an assessment. How does your organization handle failed Social Engineering Assessments? Most organizations do not take the results of the assessment seriously or simply respond with additional training. However, the key to creating a stronger culture of security is to hold our people accountable. A failed Social Engineering Assessment shows that your organization has serious weaknesses in its People, which creates a very big risk to your business. Holding your People accountable for failing Social Engineering Assessments or creating security weaknesses is a struggle for most organizations. However, in order to create a culture where everyone is expected to treat cybersecurity seriously, holding our People accountable for creating additional risk to the business has to be a priority.

Don't Create Fear of Security

We do have to be careful not to simply punish undesired behaviors such as clicking on bad links. Ruling with an iron security fist typically leads to a fear of security in which your employees will hide their mistakes from you rather than report potential security incidents. “How do we get our People to report security incidents rather than attempting to cover up their tracks?” you might ask. There are a few different ways to get to the desired result, but it’s simply a matter of rewarding desired behavior and penalizing undesired behavior. If we analyze the traditional “don’t click the link” model, it usually looks something like this: sebehaviormodel
You’ll notice the only incentive for employees to not click is fear. Fear of getting in trouble, fear of reprimand, or fear of losing his or her job. Now, an employee clicking on a link creates a HUGE risk to your organization, so there should be some form of penalty involved with the undesired behavior. However, fear itself will not create a culture of security where employees buy-in and value cybersecurity. If we take the process a step further and talk about rewarding desired behaviors, our flow-chart looks like this: sebehaviormodelreward
The best outcome regarding a Social Engineering Assessment is not simply for an employee to ignore the attack but to report it your Information Security or IT Department. Consider providing a reward (the “carrot”) to employees that report attempted phishing attacks on your organization. The reward can vary from large to small; it is completely at your discretion. Many organizations utilize a points-system (gamification) that allows employees to collect points for an extra day of PTO or branded clothing items. There are a lot of ways you can reward your employees. However, we still have an issue with the fear of clicking bad links and hiding the behavior until confronted. Employees that cover up their behavior does not help the organization out in the event of an actual attack, where you’ll be stuck playing catch-up from the start. What happens if we look at the “undesired behavior” of clicking and take it another step further? sebehaviormodelpenalty
While clicking the link is still an undesired behavior, we want to promote a positive action once an undesired behavior occurs. To do that, we want to encourage our People to report their mistake rather than cover it up or simply not tell anyone. If you are performing your own SE Assessment, you’ll be able to tell who clicked, but if it’s an actual attack, you won’t have this insight. Therefore, we want to “reward” this desired behavior (reporting mistakes rather than covering up) by effectively negating the undesired behavior of clicking the link. There’s no actual reward in this scenario, but rather than being penalized, the employee gets back to a neutral state. You can apply this concept to whatever reward process you have implemented as well. The implementation of a behavior-based model for Social Engineering Assessments will help build a strong culture of security at your institution. Be sure to focus on rewarding the desired outcomes (training your People to respond correctly) rather than simply creating the fear of being punished.

How Broadtek and SBS Can Help

At SBS, we want to help make sure you are building a culture of security at your organization. SBS has always had a training and education focus, and we’d be happy to help provide some cybersecurity training to your People. Additionally, SBS has partnered with KnowBe4 to provide your organization with the ability to test your People through automated phishing email assessments. For more tips on building a cybersecurity culture at your organization, take a look at the 10 Key Ideas to Build a Cybersecurity Culture infographic. This article was written by our partner, Secure Banking Solutions. John Waldman, CISA, CRISC - Vice President of Business Development - SBS Institute sbs-logo
Read More
Load

SUPPORT

Broadtek wants you to have the best experience possible. If you have questions, we are here to help.

OUR CLIENTS

  • Client 1
  • Client 2
  • Client 3
  • Client 4
  • Client 5
  • Client 6
  • Client 7
  • Client 8

CONTACT US


info@gobroadtek.com

PH: 573.335.5157

1315 Broadway , Cape Girardeau, Missouri 63701

SOCIAL ICONS