The likely answer is that no, you really don’t know for sure how secure your network and data is. In fact, it’s next to impossible to know, without sophisticated discovery tools that can dig into and report on, all facets of your network security. Our Cyber Security Assessment/Cyber Security Audit helps determine the current level of security in place, protecting your computer network and data.
What is our process?
By deploying our discovery tools on your network, we are able to generate detailed reports, giving us a baseline of your overall network security at a point in time. A summary of our findings plus recommendations for areas needing attention is then presented, in an easy to read report.
We understand that the security measures implemented need to be a balance between best practices for your industry, your comfort level and your budget.
Elements included in our Cyber Security Assessment are:
Security Risk Report: This executive-level report includes a Security Risk Score along with summary charts, graphs and an explanation of the risks found in the security scans.
Security Policy Assessment Report: A detailed review of the security policies that are in place on both a domain wide and local machine basis.
Share Permission Report by Computer: Comprehensive lists of all network “shares” by computer, detailing which users and groups have access to which devices and files, and what level of access they have.
Share Permission Report by User: Organizes permissions by user, showing all shared computers and files, to which they have access.
Outbound Security Report: Highlights deviation from industry standards compared to outbound port and protocol accessibility, lists available wireless networks as part of a wireless security survey, and provides information on Internet content accessibility.
External Vulnerabilities Report: A comprehensive report including security holes, warnings, and informational items that can help you make better network security decisions, plus a full scan of all 65,535 ports, reporting which are open. This is an essential item for many standard security compliance reports.
Summary
Once your initial vulnerabilities are addressed, the job of protecting your network and data is not done. This must be an ongoing process of network scanning, monitoring, alerting and maintenance activities along with employee education. Changes happen on your network daily, as do new external vulnerabilities. Our current world of heightened cyber security risks requires diligence if you are to stay protected.