Cybersecurity compliance for small businesses

Federal-grade
compliance,
handled for you.

Ongoing vulnerability monitoring, monthly security checks, and a dedicated expert who actually fixes issues — so your business stays protected as threats evolve.

Not a one-time report. Continuous protection that improves every month.

NIST
800-53 — the federal
security standard
$100
per month — ongoing
protection for your firm
24/7
continuous monitoring
not just a one-time scan
Real-world experience
NASA · Federal contractor

Authority to Operate (ATO) process

Drafted security assessments, NIST 800-53 control documentation, and contingency plans for a NASA program via Global Science & Technology

Incident response

Tabletop exercises & preparedness

Planned and executed incident response tabletop exercises evaluating organizational preparedness in a government-regulated environment

Security operations

Log analysis & remediation tracking

Monitored system logs using Splunk and tracked remediation workflows using Jira in a high-stakes federal contracting environment

Who's behind IDcore
Built on federal-grade
security experience.

IDcore was built on a simple observation: the compliance frameworks that protect federal agencies and NASA programs are the same frameworks small businesses need — they just can't afford the $20,000 consulting engagements to implement them.

Our founder spent a summer as a cybersecurity contractor on the NASA NRESS II program through Global Science & Technology — doing the kind of work most consultants charge enterprise rates for: authoring NIST 800-53 security control documentation, supporting the Authority to Operate process, writing contingency plans, and running incident response tabletop exercises in a government-regulated environment.

That's the standard we bring to every IDcore client. The same NIST framework. The same rigor around documentation and evidence. Delivered as an ongoing monthly service, priced for a 15-person firm, not a federal agency.

NASA NRESS II · Global Science & Technology

Federal cybersecurity contracting

ATO process NIST 800-53 Security controls Contingency planning Incident response Tabletop exercises Splunk Remediation tracking
Penn State University

B.S. Cybersecurity

Security & risk analysis Threat management Network security
Semperon Systems · New York

Cybersecurity internship

Risk assessment Incident response Log monitoring Network security
The difference
Not monitoring. Managing.

Most tools watch your compliance and send reports. IDcore actively manages it — the same way a bookkeeper manages your finances.

Other tools

They tell you what's wrong

Automated scans, dashboards, alert emails

You figure out what to do with the results

Reports pile up unread in your inbox

Score never actually improves

No one to call when something goes wrong

IDcore

We fix it for you

Dedicated compliance manager for your firm

Policies written, customized, and maintained

Monthly call with one clear action item

Score improves every month — you can see it

Someone picks up when you need them

What we actually do
Six deliverables, every month.

No black-box software. No alert fatigue. Six concrete things that keep your compliance current — including hands-on security scanning of your network and systems.

01

Written policies, kept current

We write your security policies using the NIST framework — the same standard applied in federal ATO processes — in plain language your staff can actually follow. Updated whenever your business changes.

Not generic templates. Policies built for your business, reviewed every month.

02

A compliance score that moves

Your score updates every month as gaps get closed. Month 1 you might be at 42. By month 6 you're at 74. You can see it working — and show it to anyone who asks.

Not a one-time snapshot. A living score that reflects what's actually been fixed.

03

An evidence locker, always ready

We organize your compliance evidence — signed policies, training records, control screenshots — so when your insurer or a client asks, you have it ready in 60 seconds. No scrambling at renewal.

The same evidence discipline required in federal ATO packages, built for your firm.

04

A 30-minute call, every month

We review your score, confirm what got done, set one clear priority for next month, and answer any questions. One call keeps your entire compliance program on track.

Not a chatbot. A real person who knows your business and its compliance history.

05

Network and vulnerability scanning

Every month we run real scans against your network and systems with professional-grade tools — mapping open ports, exposed services, outdated software, missing patches, and weak configurations. Each finding is ranked by severity.

The same kind of scanning used by federal agencies, translated into plain-language remediation steps.

06

Configuration audits and tracked fixes

We audit firewalls, cloud settings, and system configurations against security baselines to catch misconfigurations before they become breaches. Every vulnerability is logged and tracked until it's resolved — so risk goes down month over month with clear evidence of progress.

No checkbox reports. A real technical review with prioritized fixes you can verify.

Real assessment · real findings
From zero documentation
to a complete security program.
A nonprofit education organization — 20 staff, Google Workspace, Salesforce, Clover payments, donor and student data.
The situation

No written policies. No incident plan.

The organization handled donor data, credit card payments, and student records with no documented security program. Staff had never received formal security training. No incident response procedures existed for ransomware, phishing, or breach scenarios.

Our methodology

NIST CSF assessment across 7 control domains

We mapped their full environment — Google Workspace, Salesforce, Clover, FairHarbor — against NIST Cybersecurity Framework controls, applying the same structured methodology used in federal security programs.

Assessment findings
Critical

No written incident response plan — staff had no documented procedures for breach, ransomware, or phishing scenarios

Critical

MFA not enforced on Google Workspace — donor records and financial data accessible without a second factor

Medium

No formal offboarding process — departed employee accounts not systematically disabled or revoked

Medium

Vendor risk unassessed — Salesforce, Clover, and FairHarbor handle sensitive data with no security review on file

Low

No security awareness training program — staff untrained on phishing recognition, no annual acknowledgment records

"Before this assessment, we assumed our Google and Clover settings were enough. We didn't realize we had no plan if something actually went wrong."

— Operations contact, nonprofit education organization · Great Lakes region
Simple pricing
Ongoing protection. Clear pricing.

Small businesses need continuous security — not just a one-time report. Pick a monthly plan and we handle the rest.
No technical setup required — we handle everything.

Monthly plans

Recommended
Feature
Basic
$100 – $300/mo
Remote scan
Most popular
Standard
$300 – $800/mo
In-person assessment
Premium
$800 – $2,000+/mo
In-person assessment
Monthly remote security scan
Vulnerability report each month
Risk score tracking over time
Summary of critical findings
Full in-person security assessment
Full scan results (all findings visible)
Dedicated security manager
System updates guidance
Ongoing support via email & chat
Monthly check-in call
Actionable remediation guidance
Ongoing hands-on fix guidance
Quarterly deep-dive security audit
Vendor risk assessments
Staff phishing simulations
Priority response support
Basic monitoring
Remote security scanning and monthly reporting to keep you informed.
$100 – $300
per month
Remote scan only
Monthly remote security scan
Vulnerability report each month
Risk score tracking over time
Summary of critical findings
Full in-person assessment
Full scan results
Dedicated security manager
Remediation guidance
Best for businesses that want ongoing visibility into their risk
Most popular
Standard
A dedicated security manager who monitors, guides, and keeps your business safe — in person.
$300 – $800
per month
In-person assessment
Everything in Basic
Full in-person security assessment
Full scan results (all findings visible)
Dedicated security manager
Monthly scan + system updates guidance
Ongoing support via email & chat
Monthly check-in call
Actionable remediation guidance
Hands-on fix guidance
Quarterly deep-dive audit
Vendor risk assessments
Phishing simulations
Best for businesses that want issues found AND fixed every month
Premium
Full-service security operations — we handle everything so you don't have to.
$800 – $2,000+
per month
In-person assessment
Everything in Standard
Full in-person security assessment
Full scan results (all findings visible)
Ongoing hands-on fix guidance
Quarterly deep-dive security audit
Vendor risk assessments
Staff phishing simulations
Priority response support
Best for businesses handling sensitive data that need full-service protection

One-time assessment

Starting point
Feature
Basic Assessment
$499 one-time
Remote scan
Comprehensive
$1,250 one-time
In-person assessment
Remote vulnerability scan
High-level risk summary
Executive-ready PDF report
Full in-person on-site assessment
Full scan results (all findings visible)
Configuration & permissions review
Prioritized remediation guidance
Business impact analysis
30-minute walkthrough call
Delivery time 5 business days 10 business days
Basic Assessment
A focused remote security snapshot — partial results to identify top risks.
$499
one-time
Remote scan only
Remote external & basic internal vulnerability scan
High-level risk summary ranked by severity
Executive-ready PDF report
Delivered within 5 business days
Full in-person on-site assessment
Full scan results
Remediation guidance
Business impact analysis
Good for a quick remote look — upgrade for full in-person coverage
Comprehensive Assessment
A full in-person professional security audit across your entire environment.
$1,250
one-time
In-person assessment
Full in-person on-site security assessment
Full scan results — nothing hidden
Configuration and permissions review (Nmap, Nessus & more)
Prioritized risk report with step-by-step remediation
Business impact analysis
30-minute walkthrough call to review findings
Complete coverage — pair with a monthly plan for continuous protection

Monthly pricing depends on business size and complexity. Every plan starts with a full assessment. Contact us for an exact quote.
Basic plans include a remote scan with a summary of top findings. Full detailed results and in-person assessments require a Standard plan or above.

Terms & Conditions

Last updated: April 6, 2026

1. Overview of services

IDcore provides cybersecurity compliance services for small businesses. Our services include, but are not limited to:

2. Informational nature of services

All reports, assessments, and recommendations provided by IDcore are informational in nature. While we follow industry-standard methodologies and frameworks (including NIST 800-53), no vulnerability scan or security assessment can guarantee the detection of all vulnerabilities, threats, or security gaps. The cybersecurity landscape evolves constantly, and new threats may emerge after an assessment is completed.

3. Limitation of liability

IDcore shall not be held liable for any damages, losses, or security incidents that occur before, during, or after our engagement. This includes, but is not limited to, data breaches, unauthorized access, system downtime, financial losses, or reputational harm. Our services are designed to improve your security posture, but they do not constitute a guarantee against cyber threats or attacks.

To the fullest extent permitted by law, IDcore, its owners, employees, contractors, and affiliates shall not be liable for any direct, indirect, incidental, special, consequential, or punitive damages arising from or related to:

The client acknowledges and agrees that cybersecurity is an inherently evolving and imperfect discipline. No security service can guarantee complete protection from all threats. By engaging IDcore, the client agrees that our total liability, under any circumstances, shall not exceed the total fees paid by the client to IDcore in the twelve (12) months preceding the claim.

4. Assumption of risk

The client acknowledges that engaging IDcore does not eliminate cybersecurity risk. Security assessments and scans provide a point-in-time view and may not detect every vulnerability. The client assumes all risk associated with the operation and security of their own systems, networks, and data, and agrees that IDcore is not responsible for any security events or outcomes, whether or not IDcore has performed services for the client.

5. Indemnification

The client agrees to indemnify, defend, and hold harmless IDcore, its owners, employees, and contractors from any and all claims, damages, losses, liabilities, and expenses (including legal fees) arising out of or in connection with:

6. Client responsibilities

Clients are responsible for:

IDcore provides guidance and documentation, but the client retains full responsibility for applying fixes and maintaining ongoing security within their own systems.

7. Authorization requirement

By engaging IDcore for any scanning or assessment services, the client confirms that they have proper authorization to scan, test, and assess the systems, networks, and applications in scope. IDcore will only perform scans and assessments on systems that the client has explicitly authorized. Clients must not request scans on systems they do not own or have written permission to test.

8. Third-party tools

IDcore may use third-party tools, software, and services (such as vulnerability scanners, compliance platforms, and reporting tools) as part of our assessments and ongoing services. While we select reputable, industry-standard tools, IDcore is not responsible for the accuracy, availability, or limitations of these third-party products. Results from third-party tools are provided as-is and interpreted through our professional expertise.

9. No guarantee of results

IDcore makes no warranties, express or implied, regarding the outcomes of its services. There is no guarantee that our services will prevent any specific cyber attack, data breach, compliance failure, or regulatory penalty. All services are provided on an "as is" and "as available" basis.

10. Website disclaimer

The information on this website (tryidcore.com) is provided for general informational purposes only. While we strive to keep the content accurate and up to date, nothing on this site constitutes professional security advice, a guarantee of results, or a binding offer of services. Your use of this website and any reliance on its content is at your own discretion.

11. Changes to these terms

IDcore reserves the right to update or modify these Terms & Conditions at any time. Changes will be reflected on this page with an updated revision date. Continued use of our services or website after changes are posted constitutes acceptance of the revised terms. We encourage clients to review this page periodically.

12. Contact

If you have any questions about these terms, email us at tryidcore@hotmail.com or get in touch with us.

Your free compliance risk score

15 questions · 10 minutes · instant personalized results