Security Assessments & Remediation

Up to 75% of security breaches come from internal user activities. How secure is your network? We can help you find out.
Before we ever make the first recommendation, we perform a Security Assessment and Vulnerability Analysis to evaluate:

  • Firewall Protection
  • Virus Protection
  • Intrusion Detection Systems
  • Content Monitoring and Filtering
  • SPAM filtering
  • User Access Policies
  • Remote Access Security
  • Backup and Data Recovery
  • IP Video Surveillance Systems
  • Biometric Security Solutions

Given that most breaches come from inside, we also conduct an internal access study, including interviews, to evaluate internal security risks. Following this analysis, we deliver a comprehesive document outlining what we found, our recommendations, as well as suggested policies and procedures for your staff. Our recommendations are designed to be included with your organization's published policies and procedures to address critical network security issues such as:

  • Acceptable Use Policy
  • Anti-Virus Guidelines
  • Audit Policy
  • Automatically Forwarded E-mail Policy
  • Encryption Policy
  • Internet DMZ Equipment Policy
  • Password Policy
  • Risk Assessment Policy
  • Virtual Private Network (VPN) Policy

Our approach in the assessment, implementation, and ongoing support of secure networks is guided by the: Our approach in the assessment, implementation, and ongoing support of secure networks is guided by the:

  • International Organization for Standardization (ISO)
  • International Electrotechnical Commission (IEC)
  • Health Insurance Portability & Accountability Act (HIPAA)