Network Security 
Audits and Assessments

What is a Network Security Audit and Assessment?

A security audit and assessment is a systematic evaluation of the security of a company's information system by measuring how well it conforms to a set of established criteria. 

A thorough audit typically assesses the security of the system's physical configuration and environment, software, information handling processes, and user practices. 

Security audits are often used to determine regulatory compliance, in the wake of legislation (such as HIPAA, the Sarbanes-Oxley Act.)  that specifies how organizations must deal with information.

Why do Network Audits and Assesments?

Network security audits help you Assess security risks so that changes can be made to protect your company from those risks. Security audit should be done frequently, at least once a year, because, networks change quickly. As your company continues to grows older changes occur such as:











  • New Hardware
  • New Software
  • New Procedures
  • Updates and Firmware not being applied
  • etc…

Personell

Your Personnel is considered the biggest security threat, through downloads bad emails and their practices.  We will look at these issues and give you the information needed to resolve these issues.

Computers and Devices

Computers and devices at your company change daily, with updates being applied, security holes being  discovered, hence putting you at risk. Identifying these particular risks is essential.

Network Infrastructure

Firewalls and security devices not being updated as well as misconfiguration can cause security vulnerabilities .  Finding these issue and correcting them with updates and policies are needed.

Third Party Software and Services

Third party software purposely on inadvertently can cause security breaches along with third party's that have access to your data. We will evaluate your Third Party Software, Services and offer alternatives if needed.

Backups and Disaster Recovery

Data recovery is not just doing a backup, testing the recovery is essential.  In some situations government mandates require imaging of your server.  We will verify the recovery and make sure your  compliant to mandates 

Company Procedures and Policies

When procedures are not adhered to, or do not exist to guide your personnel, security risks will develop. Proper procedures are essential, and with our guidance, these procedures will help your personnel's understanding of security risks.