Two professionals analyzing financial charts and data with pens, paper, tablet, and laptop on white desk.

How an IT Services Firm is Elevating Next-Level Business Risk Management in Columbus, Ohio

January 03, 2026

Mike Moran is the co-founder and president of Affiliated, a cybersecurity, IT compliance, and IT Managed Services company based in Columbus, Ohio. He recently sat down for an interview to discuss the importance of a proactive, compliant, business-aligned approach to cybersecurity and managed services.

With more than 30+ years of business technology consulting experience, Mike leads Affiliated's company-wide strategy, marketing, and corporate development activities.

How does Affiliated stay updated on the latest cyber threats and vulnerabilities?


We maintain a proactive and structured approach. Our internal team meets regularly to review threat intelligence from multiple sources: cybersecurity publications, industry groups, compliance communities, and our tool and service providers. This ongoing intelligence gathering keeps us informed on emerging threats and evolving vulnerabilities. It's not just about monitoring threats—we also review real-time data from our Columbus and Central Ohio clients' environments using advanced security tools. We then bring this intelligence into internal discussions to refine our defense posture and adjust client protections as needed. Our focus is on anticipating and adapting, not just reacting.

Can you name some of your IT tool partners?

While we use a range of industry-leading platforms—including MDR (Managed Detection & Response), SIEM (Security Information and Event Management), SOAR (Security Orchestration, Automation, and Response), and vulnerability scanners—we intentionally don't name specific vendors. This is by design. Our philosophy is to focus on the outcomes we deliver, not the brand names. These tools are layered to build resilience across endpoints, networks, and cloud services. And because tools change as threats evolve, we remain agile in our technology stack to provide the best protection for our clients.

Can you describe a recent cybersecurity challenge and how it was resolved?


One Sunday morning, our on-call engineer received an alert at 7:30 a.m. from a client whose systems had gone down unexpectedly. The initial diagnosis suggested a cyber incident. Following our incident response plan, the engineer escalated to leadership and assembled a response team immediately. We engaged with the client's leadership, communicated transparently, and executed remediation protocols. Within 26 hours, by Monday at 9:30 a.m., the client's systems were fully operational again. The speed and efficiency were the result of preparation—having a tested incident response plan made all the difference. It underscores why we push our clients to build and rehearse their own response plans with us.

What kind of cybersecurity training and certifications does your team maintain?


We emphasize both technical expertise and procedural discipline. Every team member completes foundational cybersecurity training and we support ongoing education toward certifications like CISSP, CISM, and CDPSE. We've also just passed our SOC 2 Type 2 audit—this isn't just about having policies on paper, it's proof that we follow them in practice. Additionally, we're advancing certifications like CMMC for defense contractors and StateRAMP for public-sector readiness. We also train in accordance with insurance provider standards, positioning us as certified partners who can respond to insured incidents effectively and compliantly.

Can you explain your monitoring capabilities and how they support your security posture?


Our approach is layered and adaptive. We use RMM tools for basic performance monitoring and vulnerability scanners to assess networks and devices for patching gaps and exposure to CVEs. For clients who opt in, we deploy advanced endpoint protection (MDR) and SIEM platforms that collect behavioral and event logs across networks, applications, and users. These data streams are analyzed continuously by both internal security staff and external 24/7 SOC partners. Weekly reviews ensure alerts are tracked and remediated. Monthly, we update key documentation—like our incident response plan—and conduct exercises like tabletop simulations to validate readiness. Cybersecurity isn't static. It's a continuous cycle of detection, adaptation, and reinforcement.

How do you report activity and risks back to your clients?


We customize reporting to match each client's needs. At a minimum, clients receive monthly operational and security reports. In the event of alerts, some clients authorize us to act immediately; others want to be consulted first. For co-managed clients with in-house teams, we take a more collaborative stance—tracking open tickets, ensuring follow-up, and engaging management if remediation lags. Our reporting process is about accountability: ensuring that every threat or exposure is either resolved or on a clear path to resolution.

How do you train your clients and their teams on cybersecurity best practices?


We provide monthly security awareness training modules and simulate phishing attacks tailored to specific roles. Participation and results are tracked and shared with leadership, helping them gauge risk at the human level. Many incidents stem from user behavior, not technology, so we treat users as the first line of defense. Clients without an internal training program get full coverage through our managed services offering.

Q: How do your services support regulatory compliance (e.g., HIPAA, CMMC)?


Our core cybersecurity tools—like endpoint encryption, MFA, and access controls—directly support technical requirements found in regulations like HIPAA and CMMC. But tools alone aren't enough. That's where our Liability-Guard program comes in. It helps clients develop risk policies, conduct gap assessments, and implement policies and procedures aligned with industry frameworks. For CMMC, which requires third-party audits, we assist with configuration validation and documentation (e.g., screenshots proving MFA is enabled). Compliance is not about checking boxes—it's about building a system that meets evolving obligations without sacrificing productivity.

Q: What is the difference between CyberWatch and Liability-Guard?


CyberWatch is our penetration testing and vulnerability detection service. It identifies real-time exposures—missed patches, misconfigurations, accounts without MFA, and more. It's about catching operational gaps before bad actors do.

Liability-Guard is a governance solution. It focuses on policies, incident response, business continuity, AI acceptable use policies, and compliance strategy. It helps clients prepare for audits, insurer inquiries, and vendor risk assessments. Combined, these tools provide both tactical defense and strategic risk management.

Q: How does your Liability-Guard solution support client security and insurance readiness?


Liability-Guard addresses foundational elements of cybersecurity that often get overlooked—starting with the organization's risk policy. We help clients define what level of cyber risk is acceptable to their leadership and structure controls around that. This includes documenting policies, building incident response plans, and aligning with cyber insurance expectations.

At a basic level, it ensures clients can report accurately on their cybersecurity posture—internally and to insurers or auditors. At an advanced level, it supports business continuity planning, disaster recovery protocols, and compliance with regulatory and contractual obligations. We emphasize that security isn't just about tools—it's about integrating policies, procedures, and operational discipline to protect both data and productivity.

Q: How do you report back to clients about cybersecurity issues or progress?


Every client relationship is different, so our reporting is flexible. At a baseline, clients receive monthly IT operations and security reports. For clients with advanced security services, we review threat data, trends, and any active incidents.

When an incident occurs, we follow a predefined response and communication plan. Some clients prefer we take full responsibility for response and remediation; others handle it internally and we provide oversight. In co-managed environments, if a ticket remains unresolved, we escalate it—first to IT leads, then to management if needed. Our job is to ensure no vulnerability lingers unresolved due to communication gaps or delays.

Q: How do you train your clients' employees to play a role in cybersecurity?


User behavior is one of the biggest cybersecurity risk vectors, so we include monthly security awareness training as part of our core managed services. Each training focuses on specific threats—like phishing, password hygiene, or social engineering—and is designed to be short, practical, and relevant to employees' roles.

We also run simulated phishing tests to measure how well employees apply what they've learned. The results are tracked and reported to leadership so they can gauge staff readiness and improvement over time. It's about cultivating a security-aware culture, not just meeting a training requirement.

Q: How do your services help clients meet compliance standards like HIPAA or CMMC?

Many of our technical services align directly with compliance frameworks. For HIPAA, for instance, we help secure data at rest and in transit by enforcing strong password policies, enabling multi-factor authentication (MFA), and encrypting hard drives—especially for mobile devices.

But compliance is about more than technical controls. Through Liability Guard, we guide clients in documenting and validating their policies and configurations. For CMMC (required for defense contractors), we assist in preparing for audits, ensuring clients can show evidence of controls like MFA—often through screenshots and quarterly validation reports. We don't just deploy tools—we make sure clients can prove they're using them correctly and consistently.

Q: What are CyberWatch and Liability Guard, and how do they differ?


CyberWatch
focuses on visibility and detection. It's essentially a recurring penetration test that checks for misconfigurations, missed patches, or gaps in enforcement—like accounts without MFA or unused admin privileges. It's designed to catch lapses before they become liabilities.

Liability-Guard, on the other hand, is about governance and readiness. It helps clients define acceptable risk, build policies, develop and test incident response plans, and manage AI governance (e.g., acceptable use policies). It's designed for continuous improvement and regulatory alignment, helping clients secure not just their systems but their ability to prove compliance and resiliency.

Q: What's the real-world value of having an Incident Response Plan (IRP)?


An IRP is your playbook for responding to cyber threats. It defines roles, escalation paths, legal and insurance protocols, and communication procedures. One client recently feared credential compromise in Microsoft 365, but our IRP led us to validate it as a false alarm—a user had mistyped their new password. No incident, just a well-managed event.

But when a real incident hits—like ransomware—having an IRP ensures you don't make costly mistakes. For example, cyber insurance may not reimburse any work done before a claim is officially opened. The IRP helps clients know when to call legal counsel, what steps must be taken, and how to communicate internally and externally. It's about reducing chaos, preserving coverage, and speeding recovery.

You emphasize the importance of having an Incident Response Plan. What is its strategic value?


At a strategic level, an Incident Response Plan (IRP) transforms chaos into control. It isn't just a checklist of actions—it's a formalized approach to identifying, assessing, and responding to cyber threats in a way that aligns with your organization's business continuity, regulatory, and insurance requirements.

Here's why it matters:

· Clear Roles and Protocols: An IRP defines who does what, when, and how during a cyber event. That clarity reduces confusion and speeds up decision-making during high-pressure situations.

· Insurance Readiness: Cyber liability insurance carriers now expect you to follow strict notification and response procedures. If you begin remediation before officially opening a claim, insurers may deny coverage. A well-structured IRP includes those thresholds and ensures you don't jeopardize reimbursement or legal protections.

· Legal and Reputational Risk Mitigation: Knowing when to involve legal counsel, how to communicate with stakeholders, and how to handle sensitive data exposures helps limit liability. It also ensures that internal staff don't inadvertently say something damaging—like a receptionist unknowingly confirming a ransomware attack to a caller.

· Business Continuity: A good IRP ensures the technical team isn't working in a vacuum. It connects IT response to operational continuity—making sure payroll still runs, customer support continues, and leadership has timely updates to make informed decisions.

· Strategic Resilience: Most importantly, the IRP shifts your cybersecurity posture from reactive to proactive. It forces leadership to define acceptable risk, think through worst-case scenarios, and invest in preparedness. That strategic discipline is what turns a one-time breach into a survivable, learnable moment instead of an existential threat.

In short, an IRP isn't just about response—it's about preparedness, alignment, and protecting the future of the business.

How do you measure the success of your cybersecurity services?


We don't define success as "no incidents"—that's unrealistic. The real metric is how quickly and effectively we detect, contain, and recover from threats. Are we reducing time to resolution? Are we communicating clearly? Are we helping clients restore operations without long-term disruption?

For example, a client once experienced an incident without having all our security tools in place. But because they used our backup services and incident response plan, we were able to get them operational by 9:30 a.m. the next business day. That's success: limiting damage, protecting productivity, and restoring trust.

What does Affiliated do best?


What sets us apart in Columbus and Central Ohio is not any single tool or certification—it's our holistic, partner-driven approach. We combine elevated technical capability with operational discipline, client-specific responsiveness, and strong relationships with tool providers.

Our success comes from embedding ourselves in our clients' environments and acting with care and accountability. We're not just here to prevent breaches; we're here to build cyber resilience—top to bottom, tools to people, strategy to execution.

The bottom line is this: With a business risk management mindset, Affiliated helps organizations avoid the cost of inaction through proactive, compliant, business-aligned managed services.

Interested in a conversation or want to learn more? Contact us here.