Offered Services

Red Fox Group offers a variety of services to our customers. From general network setups to very meticulous certification preparation.

Don’t see what you’re looking for? Reach out and see if we may be able to offer this service, or get you in contact with someone who can help!


Red Fox Group - Managed IT Services

Managed IT Services

Red Fox Group offers many levels of managed services. From hardware to a 24/7 help desk line available to our clients.

We strive to deliver excellent service to all of our clients.


Red Fox Group | Penetration Testing

Penetration Testing

Penetration testing, also known as Pen Testing is a lawful exploit of a computer system or systems. Pen Testing is normally conducted in two ways, one being inside of the client network looking for holes, and the other completely outside, a type of simulated attack.
Red Fox Group offers both services to our clients.

Red Fox Group | Risk Assessment

Risk Assesment

The Cyber threat landscape is ever growing more dangerous. Every day businesses are exploited and data is stolen, sometimes going unnoticed for months, or even years. To put your customers, and our clients at ease, we offer a Risk Assessment. This process includes the examination of your data, the who, what, where and why. Upon completion we will present best practice solutions to appease the risk of exposing your or your customers data.

Red Fox Group | Consultation

Cyber Security Consultation

Don’t have any security measures? Don’t know where to begin? Contact us, we will help get you started and see you are secure.

Don’t wait until its too late!

Red Fox Group | Incident Respone

Incident Response

Think you’ve been compromised? Don’t know where to start? Give us a call and allow us to help you figure out what went wrong. From there we will be able to assist you in remediation of the incident.

Red Fox Group | Policy & Procedure

Policy and Procedure

Without documentation a cyber incident can get out of hand and overwhelming very quickly. Policies and Procedures are generally written to help streamline the problem into a solution. We take pride in writing precise Polices and Procedures, unique to each environment.

Red Fox Group | Cyber Security Training


Let us train you and your users on basic best practice. From recognizing phishing emails to learning about how operating systems work and interact.
We offer both on site training, as well as online training. Please contact us for an estimate and a demo.