905-458-9333 or 1-(800)-958-2341

Cyber Security Assessment / Cyber Security Audit

Audit Assessment hand written
  • Do you have a good handle on how secure your organization’s computer network is, both from the inside and from the outside?
  • Do you have policies in place regarding:
    • Passwords
    • Who has access to what files
    • Who has remote access to your network
    • Where sensitive information should be stored?
  • Do you know if those policies are being followed?
  • Do you know where all your data is located – Servers, individual PC’s, mobile devices, in the cloud?
  • Is your computer network being regularly maintained with software security updates & patches from Microsoft and third party software applications?

The likely answer is that no, you really don’t know for sure how secure your network and data is. In fact, it’s next to impossible to know, without sophisticated discovery tools that can dig into and report on, all facets of your network security. Our Cyber Security Assessment/Cyber Security Audit helps determine the current level of security in place, protecting your computer network and data.

What is our process?

By deploying our discovery tools on your network, we are able to generate detailed reports, giving us a baseline of your overall network security at a point in time. A summary of our findings plus recommendations for areas needing attention is then presented, in an easy to read report.

We understand that the security measures implemented need to be a balance between best practices for your industry, your comfort level and your budget.

Elements included in our Cyber Security Assessment are:

Security Risk Report: This executive-level report includes a Security Risk Score along with summary charts, graphs and an explanation of the risks found in the security scans.

Security Policy Assessment Report: A detailed review of the security policies that are in place on both a domain wide and local machine basis.

Share Permission Report by Computer: Comprehensive lists of all network “shares” by computer, detailing which users and groups have access to which devices and files, and what level of access they have.

Share Permission Report by User: Organizes permissions by user, showing all shared computers and files, to which they have access.

Outbound Security Report: Highlights deviation from industry standards compared to outbound port and protocol accessibility, lists available wireless networks as part of a wireless security survey, and provides information on Internet content accessibility.

External Vulnerabilities Report: A comprehensive report including security holes, warnings, and informational items that can help you make better network security decisions, plus a full scan of all 65,535 ports, reporting which are open. This is an essential item for many standard security compliance reports.

Summary

Once your initial vulnerabilities are addressed, the job of protecting your network and data is not done. This must be an ongoing process of network scanning, monitoring, alerting and maintenance activities along with employee education. Changes happen on your network daily, as do new external vulnerabilities. Our current world of heightened cyber security risks requires diligence if you are to stay protected.


logoimg

BOOK A FREE SERVICE TICKET


Getting your computer network, phones and software applications to work shouldn’t be a monumental project;
yet we constantly hear from frustrated organizations like yours who call us when they’ve finally
had enough of the poor services and excuses from their current IT support firm.

Our offer of a FREE Service ticket is a no-risk way of introducing our services.
Let us diagnose and work on the computer problem of your choice and
find out what over 25 years of service excellence feels like.

Accepting this free offer in no way obligates you to do any further business with us but of course we hope you will!

Conditions:
1. Because our resources are not unlimited, the free service ticket will cover a maximum of 2 hours of remote support for 1 service issue.
2. Since customers who are the best fit for our services have a minimum of 10 computers, this free offer only applies to organizations of this size.
3. This offer applies only to organizations who are not already a customer of BSC Solutions Group.

Please fill out this form and a BSC Solutions Group “IT Guardian Angel”
will contact you within 24 hours.









CAPTCHA ImageChange Image

Close

×