FAQ
Frequently Asked Questions
Answers about how ShadowGrid works, how pricing and projects are structured, how we handle incident response and investigations, and how we support SMBs, government teams, and VIP clients.
Support and services
Common questions about working with ShadowGrid
If you do not see your question here, reach out anyway. Many of our best engagements started with a simple “I am not sure where to start, but something feels off.”
All ShadowGrid engagements are scoped around clear outcomes. We look at your environment, goals, and risk,
then shape a project or support plan that fits. Pricing depends on depth, number of systems, and urgency.
After a short conversation, you get a written estimate so you know what to expect before we start.
Managed service providers focus on day to day IT operations such as tickets, patching, and user support.
ShadowGrid focuses on design, security, and resilience. We build and test the systems your IT team or MSP
operates, and we are often brought in to harden environments, validate controls, or support audits and incidents.
A discovery call is a short conversation where we learn about your current environment, recent issues, and
what prompted you to reach out. We will ask a few targeted questions, explain how we typically work with
organizations like yours, and then recommend a specific first step such as a cyber health check, cloud
review, or incident readiness assessment.
Most small and growing businesses start with a focused cyber health check. We look at your core systems,
cloud accounts, and network, then highlight the most important fixes in plain language. You get a
prioritized list of actions that reduce risk without forcing major changes on day one.
Yes. We support agencies and contractors that need to align with guidance such as NIST 800 171, NIST 800 53,
CMMC, and state or local requirements. We help identify gaps, prepare evidence, support cyber insurance or
grant questions, and build continuity and COOP plans that match the mission.
ShadowGuard Elite is our private client service for executives, public facing professionals, and families.
We reduce online exposure, harden home networks and personal devices, prepare safer travel profiles, and
provide ongoing support for people whose personal and digital lives attract more attention and risk.
Yes. We provide incident response support whether you are just noticing something strange, in the middle of
an active incident, or dealing with the aftermath. We can help with containment, investigation, and
recovery, and we work with your internal team or IT provider to move quickly.
Yes. Many of our incident response engagements come from organizations we have never worked with before.
We can step in to help stabilize the situation, coordinate with your IT or MSP, and investigate what
happened. After the incident, we can also help you strengthen your environment so the same thing is less
likely to happen again.
We provide investigative support to help you understand how an incident occurred, what systems or accounts
were accessed, and what data may have been affected. Where appropriate, we use forensic techniques and
logging to reconstruct attacker activity and provide clear, written findings that you can share with
stakeholders, insurance, or legal counsel.
Yes. We specialize in hybrid environments across AWS, Azure, and on premises infrastructure. We review
configurations, identity and access, network paths, and logging so that your security controls make sense
across the whole environment, not just one part of it.
Yes. We create and refine security policies, standards, and procedures that match how you actually work.
These can be aligned with frameworks such as NIST, ISO 27001, HIPAA, or SOC 2, and are written in language
your team can understand and follow rather than generic filler.
We offer light weight retainers for periodic reviews, security and compliance check ins, and VIP privacy
support. Retainer clients have easier access to advice and faster response if something goes wrong, while
still keeping internal ownership of day to day IT operations.
Yes. Protecting sensitive information is a core part of the work. We are happy to sign a mutual NDA before
diving into details, and we follow strict practices for limiting access to data, using secure transfer
methods, and removing client information when it is no longer needed.
ShadowGrid Solutions maintains professional and cyber liability coverage. We can provide proof of insurance
and complete vendor onboarding forms as needed so you can meet client or agency procurement requirements.
Timelines vary by scope and how quickly we can coordinate with your team. Many small business assessments
and focused projects finish within two to six weeks. Larger compliance readiness or transformation efforts
can take several months. During scoping, we will give you a realistic timeline so you can plan around it.
Yes. Passing an audit is not the finish line. We help clients stay secure afterward by validating that
controls still work, running periodic tests, and updating documentation and configurations as your
environment and the threat landscape change.
The easiest way to start is to schedule a short call or send a message through the contact form. Share a
little about your environment and what has you concerned. From there we can recommend a clear first step and
outline what working together would look like.