Security and how we can help


Security

Security is a wide-ranging topic filled with complex information and lists of tools impossible to know the depths of.  This information is also constantly changing with new technologies, vulnerabilities and approaches. However, these tools and information has been put together because of countless compromises and billions of dollars spent in recovering systems.  Security best practices incorporate the most recent lessons learned culminating in information to reduce the risk of a breach and have a plan for when breaches occur.  Contact us to reduce the risk of adding to this massive pool of lost resources.  

Breach offers the following approach:

1.  Understand the current security posture and appetite for security in the organization 

2.  Determine critical assets which would cause significant harm if compromised

3.  Test to see which vulnerabilities currently exist 

4.  Document the results in human readable format along with a strategy for fixing 

5.  Assist with closing vulnerabilities and retesting We offer three tiers of security analysis using this approach:  

1st tier: Processes and Procedures

Table top testing and disaster recovery planning documentation review, revision, and recommendations physical and Information Technology security review and presentation of best practices.

2nd tier: Active Security Analysis (Recommended)

Everything in tier 1 

Use of tools to understand security posture along with penetration testing system scans Produce an active security threats document stating findings along with steps to remediation and Retesting after remediation  

3rd tier: Deep Scanning and Advanced analysis

Everything in tier 1 

Everything in tier 2

Deep dynamic analysis of highly sensitive assets Deep testing of physical and IT asset security

Code review and active software remediation

All our customers receive access to the following services:

1.  Security consulting to use our security helpdesk when questions come up about current security threats.  We are your source of information 

2.  Security notifications.  When potential compromise is realized globally or regionally, we send out notifications on how to remediate and severity level of the compromise.   This includes which of the systems at an organization that would be affected. 

3.  Remediation assistance: Our security consultants are also skilled IT professionals. We can help fix the security problems as well as offer recommendations of other vendors who can help. 

4.  Emergency support services during an attack.  We provide a skilled lighting team to be on site while an investigation is under way to answer questions to law enforcement and immediately remediate any compromised systems. Please contact us today for a time to start reviewing your options.