Services
Cyber Recon

Are you comfortable with your current cybersecurity posture?

How do you know if you are secure?

Are you compliant with government Cybersecurity requirements?

If you are not sure, we can provide you with an independent assessment

 

Cyber Recon is a comprehensive scalable assessment of your current Cybersecurity posture, from up to six different perspectives:

      • Cyber Threat Risk Assessment
      • Phishing Threat Risk Assessment
      • Cloud Security Risk Assessment
      • Data Security Risk Assessment
      • Security Posture Risk Assessment
      • Supply Chain Risk Assessment
What do each assessment consist of?
 
  • Cyber Threat Risk Assessment
    • The Cyber Threat risk assessment is an assessment of your Cybersecurity infrastructure. We place a Fortinet Fortigate 60e firewall device onsite for 30 days. During this time, it is passively monitoring your network traffic to gather a baseline. We then provide you with a report assessing three primary sections:
      • Security and Threat Prevention
      • User Productivity
      • Network Utilization and Performance
      • SD-WAN and eMail Risk Assessments options are also available

 

  • Phishing Threat Risk Assessment
    • The Phishing Threat risk assessment is an assessment of the Cybersecurity awareness training of your personnel. We will work with your IT staff to conduct phishing simulation tests on up to 100 employees. The phishing simulations are run over a 24 hour period. You will receive a report on the results. This is an excellent gauge of the impact of your Cybersecurity awareness.

 

  • Cloud Security Risk Assessment
    • The Cloud Security risk assessment is an assessment of your IT Environment. This consists of two parts: the OneLogin Cloud Discovery Tool using Cisco Umbrella, and an infrastructure remediation & recommendation plan. You will receive a report with architecture remediation and recommendations for the gaps and vulnerabilities uncovered.

 

  • Data Security Risk Assessment
    • The Data Security risk assessment is a custom security assessment designed based on your needs, regulations, and configurations. You will get to see where your biggest data security threats are. We will help you to identify and prioritize at-risk areas, discover overexposed and at-risk sensitive and classified data, review access controls and authorization processes, analyze folder and file access, and expose data vulnerabilities. This is non-intrusive and hassle free.

 

  •  
  • Security Posture Risk Assessment
    • The Security Posture risk assessment ensures that your organization’s protection meets organizational and industry compliance requirements. This assessment will help you know where there are risks and how to mitigate complex security issues in real-world scenarios. You will be prepared to implement better security for technology, people, and business processes. We will identify the existing cyber security posture, and risk evaluation in alignment with ISO27001, NIST and industry best practices against common threats and breach vectors.

 

  • Supply Chain Risk Assessment
    • The Supply Chain risk assessment is an assessment of the third party vendor risk and enterprise cyber risk monitoring. Third-party breaches are on the rise. Cybercriminals are actively targeting third-party vendors, knowing that they represent a viable point of entry. Third-party breaches are on the rise. SecurityScorecard cybersecurity risk ratings platform enables companies to improve their cybersecurity health by instantly rating and understanding the security risk of any company, from an outside-in perspective.
Our Cyber Recon service can help your business understand where you are currently at with your Cybersecurity posture, what you can do to improve, and increase your compliance with regulations.
 
 
Travel expenses are subject to extra charge