Small Business Security Diagnostic
Does your small and medium sized business manage critical information that you need to protect?
Our security diagnostic services provides you with a basic report card style evaluation that compares your security practices to those used to provide basic protection and response related to security incidents. This report can be used to help plan and implement necessary improvements to achieve an adequate level of security.
For this service we utilize the SANS institute’s 20 Top Critical Security Controls to focus on only the most important elements in your defences. These include;
1: Inventory of Authorized and Unauthorized Devices
2: Inventory of Authorized and Unauthorized Software
3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
4: Continuous Vulnerability Assessment and Remediation
5: Malware Defenses
6: Application Software Security
7: Wireless Access Control
8: Data Recovery Capability
9: Security Skills Assessment and Appropriate Training to Fill Gaps
10: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
11: Limitation and Control of Network Ports, Protocols, and Services
12: Controlled Use of Administrative Privileges
13: Boundary Defense
14: Maintenance, Monitoring, and Analysis of Audit Logs
15: Controlled Access Based on the Need to Know
16: Account Monitoring and Control
17: Data Protection
18: Incident Response and Management
19: Secure Network Engineering
20: Penetration Tests and Red Team Exercises
We will tell you which of these controls is important to you, evaluate the design of these controls in your environment, and provide specific practical recommendations to implement controls critical to your business.
Call or email us today to get started.
Our security diagnostic services provides you with a basic report card style evaluation that compares your security practices to those used to provide basic protection and response related to security incidents. This report can be used to help plan and implement necessary improvements to achieve an adequate level of security.
For this service we utilize the SANS institute’s 20 Top Critical Security Controls to focus on only the most important elements in your defences. These include;
1: Inventory of Authorized and Unauthorized Devices
2: Inventory of Authorized and Unauthorized Software
3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
4: Continuous Vulnerability Assessment and Remediation
5: Malware Defenses
6: Application Software Security
7: Wireless Access Control
8: Data Recovery Capability
9: Security Skills Assessment and Appropriate Training to Fill Gaps
10: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
11: Limitation and Control of Network Ports, Protocols, and Services
12: Controlled Use of Administrative Privileges
13: Boundary Defense
14: Maintenance, Monitoring, and Analysis of Audit Logs
15: Controlled Access Based on the Need to Know
16: Account Monitoring and Control
17: Data Protection
18: Incident Response and Management
19: Secure Network Engineering
20: Penetration Tests and Red Team Exercises
We will tell you which of these controls is important to you, evaluate the design of these controls in your environment, and provide specific practical recommendations to implement controls critical to your business.
Call or email us today to get started.