Assessment

assessment

Receive your FREE Cybersecurity Risk Assessment

Schedule a Free Assessment

Understand Your Security Position and Vulnerabilities with a Comprehensive Cybersecurity Risk Assessment

In today’s complex security landscape, it’s impossible to prevent all threats. Just like your insurance policy, security is all about managing your risks. With a comprehensive cybersecurity assessment, we can evaluate and mitigate risky activities that leave you vulnerable to a cyberattack damaging your operations.  We will give you the answers you want and the certainty you need!

 A Holistic View of Your Security Health

Our approach to security starts with a global view of your security health. Like a 100-point inspection on your car, we conduct a proactive assessment of your policies, procedures, and technology to assess all possible security gaps and their level of severity. Together, we’ll discuss the gaps found, why they matter, and how to address each risk.  This comprehensive assessment includes:

  • Dark Web Scan
  • Network Assessment
  • Security Assessment
  • Security Risk Assessment
 Backed by a Trusted Cybersecurity Framework

While there are many approaches to cybersecurity, we believe in standardizing on an industry-wide framework. Our risk assessment is based on the NIST Cybersecurity Framework, developed and backed by the U.S. government. This framework enables us to apply the best practices of risk management across your entire organization to improve our ability to prevent, detect, and respond to cyberthreats.

 Allocate Your Security Budget Wisely

While there are many approaches to cybersecurity, we believe in standardizing on an industry-wide framework. Our risk assessment is based on the NIST Cybersecurity Framework, developed and backed by the U.S. government. This framework enables us to apply the best practices of risk management across your entire organization to improve our ability to prevent, detect, and respond to cyberthreats.

 A Roadmap to Mitigate Your Top Risks

While there are many approaches to cybersecurity, we believe in standardizing on an industry-wide framework. Our risk assessment is based on the NIST Cybersecurity Framework, developed and backed by the U.S. government. This framework enables us to apply the best practices of risk management across your entire organization to improve our ability to prevent, detect, and respond to cyberthreats.

 

Our Risk Assessment Process

Our_Risk_ASS_Header_graphic

Assessment Overview

Dark Web Scan

Part I

Your company’s email credentials that have been compromised and are available for sale on the Dark Web

  • Specific email addresses and password(s)
  • Publish date
  • Breach source
ASS_IMGs copy

Part II

Determine if your email domain anti-spam SPF, DKIM, and DMARC configurations are correct.

  • Ensures an email sender is who they say they are!
ASS_IMG_2
Network Assessment
6 Individual Reports
  • Risk Score
  • Issues
  • Operating System
  • Windows Patch Assurance
  • Endpoint Security (Anti-virus, Anti-spyware, Firewall?)
  • Internet Speed
  • Asset Summary
  • Device Aging
  • and more...
ASS_IMG_3
Security Assessment
13 Individual Reports
  • Risk Score
  • Issues
  • Password Policies
  • Data Breach Liability (SSN, Birthdate, DL, PII)
  • User Controls (No access to specific sites [Ex. adult sites, file share])
  • and more...
ASS_IMG_4
Security Risk Assessment
  • NIST Cybersecurity Framework

NIST Cybersecurity Framework
  • Overall Risk Assessment

  • Top Risk Areas

  • Top RIsk Area Recommendations 

  • Industry Comparisons

IND_COMP
Overall Risk Assessment
Compliance Assessments

Do you need to perform assessments to verify compliance with regulatory agencies?  We can help you there to, just contact us.

PCI_DSS
PCI DSS – Payment Card Industry Data Security Standard

Nearly 22 million businesses have merchant accounts and accept credit cards, requiring them to comply with PCI standards. Businesses that don’t follow suit are subject to significant fines and may lose their right to accept credit cards.

HIPAA
HIPAA – Health Insurance Portability and Accountability Act

More than 700,000 hospitals, emergency medical clinics, dental offices, nursing homes, and other health-related entities and an estimated 2 million other companies that do business with these entities are required by law to have a specialized IT risk assessment performed to satisfy HIPAA requirements.

GDPR
GDPR – General Data Protection Regulation

General Data Protection Regulation is a law passed by the European Union that all country states and the UK have agreed to adhere to. Any company that processes or retains European citizen data is subject to enforcement.

plug000
Cyber Risk Insurance

Ensure that you will actually get paid in the event of a claim by automatically verifying the accuracy of information submitted on the original insurance application and then documenting on an ongoing basis, that you have used “due care” to reasonably secure your computer network against a breach.

 

FREE Assessment