• Home
  • About Us
  • Partners
  • Contact
Just One SecurityJust One Security
  • Home
  • About Us
  • Partners
  • Contact

Your Partner for Securing Hard Earned Discoveries

Our Mission

Manageable cybersecurity programs that are effective, comprehensible, and complimentary to the field of research and development.

"Terry has been instrumental in shaping, guiding and monitoring the cybersecurity framework for a very large, complex, multi-institutional data sharing initiative sponsored by the National Cancer Institute."

- Dr. Ethan Cerami
Director, Cancer Immunology Data Commons

Consulting

The business of discovery is dynamic and ever changing. You need a security program that can keep up and move with the efforts of your investigators. We work hands-on to develop a program that does just that.

Training

Security awareness training is not a one size fits all. We provide services that address the need for role-based training, departmental / group separation, policy acknowledgement, and email phishing education.

Operations

Security programs have expiration dates. Policies, processes, and monitoring activities require regular reviews and reporting to stay effective. If an extra hand is needed, we can help fill the gaps without breaking the budget.

What are your challenges in securing your research environment?

You can have a sustainable environment by establishing a program that aligns with federal grant agencies but is tailored to support the needs of your researchers.

Operations and Monitoring

Consistent reporting is the life blood of an effective and sustainable security program.

Program Development

Policies, Plans, and procedures create a strong foundation for a scalable program.

Security Education

Easy and customizable options ensure the right education is applied to protect your people.

Facilitation

Cybersecurity enables data control in support of secure collaborations and funding opportunities.

Security Consulting

We provide expertise that is rooted in best practices guided by the needs of research.

Incident Management

Preparation is a vital component to mitigating the extent of damage when bad things happen.

2019 Security Statistics

Security Incidents

Successful Data Breaches

% Discovered > 1 month after occurance

Consider the last: The majority of breaches went unnoticed for over 30 days.
To leverage the most out of your technology investments, you must have consistent operations that support them.
Source: Verizon DBIR 2019

    Contact Us

    Send us an email and we'll get back to you, asap.

    Send Message

    © 2025 Just One Security