- Do you have a good handle on how secure your organization’s computer network is, both on the inside and from the outside?
- Do you have policies in place regarding passwords, who has access to what files, who has remote access to your network and where sensitive information such as credit card details are stored? Do you know if those policies are being followed?
- Is your computer network being regularly maintained with software security updates and patches?
The likely answer is that no, you really don’t know for sure how secure your network and data is. In fact, it’s next to impossible to know, without sophisticated discovery tools that can dig into and report on, all facets of your network security.
Our Cyber Security Assessment/Audit helps determine the current level of security in place, protecting your computer network and data. By deploying our discovery tools on your network, we generate extremely detailed reports, giving us a baseline of your overall network security at a point in time. A summary of our findings plus recommendations for areas needing attention is then presented. The security measures implemented need to be a balance between best practices for your industry, your comfort level and your budget.
Elements included in our Cyber Security Assessment are:
Security Risk Report: This executive-level report includes a Security Risk Score along with summary charts, graphs and an explanation of the risks found in the security scans.
Security Policy Assessment Report: A detailed review of the security policies that are in place on both a domain wide and local machine basis.
Share Permission Report by Computer: Comprehensive lists of all network “shares” by computer, detailing which users and groups have access to which devices and files, and what level of access they have.
Share Permission Report by User: Organizes permissions by user, showing all shared computers and files to which they have access.
Outbound Security Report: Highlights deviation from industry standards compared to outbound port and protocol accessibility, lists available wireless networks as part of a wireless security survey, and provides information on Internet content accessibility.
External Vulnerabilities Report: A comprehensive report including security holes, warnings, and informational items that can help you make better network security decisions, plus a full scan of all 65,535 ports, reporting which are open. This is an essential item for many standard security compliance reports.
Once your initial vulnerabilities are addressed, the job of protecting your network and data is not done. This must be an ongoing process of network scanning and maintenance activities along with employee education. Changes happen on your network daily, as do new external vulnerabilities. Our current world of heightened IT security risks, requires diligence if you are to stay protected.