Our cyber security team can perform the necessary assessments to help you better understand your current protection levels and identify where gaps exist. We offer a variety of cyber security assessments to help provide an understanding of your organization’s cyber security posture.
Our cyber security team can perform the necessary assessments to help you better understand your current protection levels and identify where gaps exist. We offer a variety of cyber security assessments to help provide an understanding of your organization’s cyber security posture.
A foundation assessment is designed to cost-effectively determine a systems overall security posture with existing policies, procedures and practices. The foundational assessment leverages the fact that system vulnerabilities generally follow the 80-20 principle. That is, 80% of the risk can be attributed to 20% of the vulnerabilities. Since most of these vulnerabilities are introduced pool policies, procedures and practices, they can be identified and remediated with less effort but provide impactful results. Examples of such vulnerabilities include lax user computing practices and policies or insecure system design and implementation. The assessment is designed to identify these large-scale vulnerabilities and allow remediation before embarking on further, more in-depth assessments designed to identify individual system configuration issues.
The foundational cyber security assessment will include the following steps, our team will:
The deliverable from a preliminary assessment is a short, concise report which lists the major vulnerabilities identified for remediation. This “Top 10” list is designed to provide understandable and actionable recommendations to cost effectively improve your information security posture. Upon remediation of these issues, the client may decide to pursue a follow-on assessment on other key areas.
Our social engineering assessment includes a customized approach to evaluating your employees’ susceptibility to social engineering attacks beginning with a baseline assessment to form the foundation for strengthening any exposures.
When it comes to modern cyber security attacks, did you know your employees are one of your biggest weaknesses? With most attacks resulting from employee phishing attempts, it is important to see how your employees react to simulated phishing attacks; a formal assessment can help lead the way.
Learn MoreOur vulnerability assessment will uncover where you have the highest exposure to a cyberattack. Each assessment is based on operational and technical controls to quickly and accurately identify gaps and weaknesses.
Learn MoreHowever confident you feel about your cyber security protocols and practices, there is always room for improvement. With attacks evolving daily, a penetration test can provide an inside look at all of your potential systems and application gaps through a controlled breach.
Learn More