skip to Main Content

Welcome

Stronghold Cyber Security is a veteran-owned cyber security company located near historic Gettysburg, Pennsylvania that provides cutting-edge security services to businesses throughout the country. Service offerings include regulatory compliance, penetration testing, advanced cyber risk management, along with customized cyber security programs.

Get In Touch

Email: info@strongholdcybersecurity.com
Phone: 1-888-277-8320
Phone: 717-918-3301
Address: Gettysburg, PA

Our Location

Gettysburg
Cyber Security Threats To US Manufacturing

CEO of Stronghold Cyber Security discusses cyber security threats to U.S. manufacturing on Manufacturing Talk Radio

Jason McNew, CEO of Stronghold Cyber Security, will be featured on Manufacturing Talk Radio with Lew Weiss and Tim Grady at 1 PM ET to discuss cyber security threats to U.S. manufacturing, data for sale on the Dark Web, and…

Read More
TheStreet

Stronghold Cyber Security CEO commentary featured in TheStreet’s article on child identity theft

TheStreet, an American financial news and services website founded by Jim Cramer which also provides data and analysis for investors, featured commentary by Stronghold Cyber Security's Jason McNew in an article that discusses child identity theft and what can be…

Read More
Innovative Manufacturers' Center Logo

Stronghold Cyber Security CEO to speak at Innovative Manufacturers’ Center’s Technology Briefing

Stronghold Cyber Security's Jason McNew will be speaking at the Innovative Manufacturers' Center's North Central PA Technology Briefing 2018 on April 6th at Penn College in Williamsport, PA.  McNew's presentation "From Swords to Keyboards: American Businesses Under Attack" will discuss…

Read More
Channel Executive Magazine March 2018

Channel Executive Magazine Interviews Stronghold Cyber Security CEO About Cyberattacks

Channel Executive Magazine interviewed Stronghold Cyber Security's Jason McNew for its March/April 2018 edition.  The article is titled "Is The Channel Prepared For Cyberattacks?" and features commentary on whether cyber security vendors have created applications that are able to handle…

Read More
Back To Top