Cyber Security

Our team has worked with thousands of organizations around the globe assessing, training, and implementing cyber security strategies.

Accurately assessing your network or applications to mitigate threats is the first step in any Cyber Security defense strategy. Our team has worked with thousands of organizations in the assessment, design, and implementation of their cyber security strategy from Health Care to Government.

WHAT WE CAN DO FOR YOU:

  • DDoS (Distributed Denial of Service Protection)
    • Website Protection
    • Infrastructure Protection
    • Name Server Protection (DNS)
  • Web Application Security
  • Data Security
  • Risk Management
  • Incident Management
  • Penetration Testing
  • Firewall Assessment
    • Rule-based configuration
    • Operating system, patch revision release levels
    • Security settings review
  • Wireless Assessment
    • Location wireless assessment
    • Discovery of visible wireless access points
    • Identify potentially rogue devices and access points
    • Review of authentication and encryption in use
    • Testing of wireless segmentation
  • Cyber Security Programs
  • InfoSec Staffing
  • Virtual ISO
  • Medical IoT Cyber Security
  • Social Engineering Assessment
    • Access testing to facilities, secure areas, documents, credentials, confidential information.
    • Security bypass testing for data access.
    • Includes bypass testing of electronic, personnel and procedural controls.
    • Documentation and report of these exercises, including information obtained.
  • Internal Assessment
    • Examines internet-facing infrastructure, network and systems.
    • Includes, but is not limited to such systems as:
    • Internet or DMZ/perimeter network servers
    • Internet screening routers
    • Internet-facing firewalls
    • E-mail servers
    • DNS servers
    • Servers for storing/processing ePHI
    • Web applications
    • Other systems as required
    • DNS system configuration review
    • Reconnaissance activities related to metadata available in publicly accessible documents and Google Hacking Database entries
    • Web site/application review for issues related to the OWASP Top 10
  • Compliance & Readiness Assessments
    • HItrust
    • HIPAA / HITECH
    • FERPA
    • NIST
    • GDPR
    • PCI DDS
    • Medical IoT
    • CCPA
NIST
IT Security Staff

WHY CHOOSE US

Our team has serviced entrepreneurs, SMB, nonprofits, and enterprise organizations. We know which solution fits best for a 2 person operations that’s on a shoe string budget to enterprises that have a large IT spend. We’re solutions agnostic, meaning we’re not going to push into a solution because it’s the only one we know or understand. We’ll determine that best solution, based on your business model.

WOULD YOU LIKE A COMPLIMENTARY NETWORK HEALTH CHECK?