There are many ways a network can be compromised and unfortunately, few businesses realize what is actually going on “behind the scenes”. You might take the time to visit the doctor for your annual check-up, but when was the last time your business had a security check-up?
Think about it. Your network is constantly at risk.
While you might have firewalls, virus protection tools and internet filters in place, they aren’t 100% foolproof. If they were, we wouldn’t see the hugely publicized security breaches we see the news headlines today. When these tools address a security threat, a new one emerges.
Between email-based viruses sneaking in through unprotected mailboxes, to worms, viruses and malware, if you haven’t taken the steps to fully secure your system, you might be surprised what vulnerabilities you’ll find within your network.
You can’t monitor the security habits within the company, but you can run a check-up to find out just how “healthy” your business is security wise.
Ontech Systems now offers a complete IT Security Assessment that scans your network and gives you an in-depth look at network areas that are typically the most unsecure. We will provide you with 6 comprehensive reports that deliver all the information you need to know, right at your fingertips.
1) Executive-Level Security Risk Report: Business owners, executives and managers want to see high-level detail with summary charts, graphs, scores and an overview of any risks found.
This executive-level report provides just that.
2) Security Policy Assessment Report: Our Security Policy report provides you with a detailed review of the domain-wide and PC based security policies in place within the company.
3) Shared Access Report: It’s good practice to manage file restrictions at an employee level. This report offers a comprehensive list of all network “shares” by computer, showing you, which users or groups have access to which files and devices – and what level of access they have.
4) User Permission Report: This report organizes permissions by user, showing all shared computers and files each user has access to.
5) Internal Vulnerabilities Report: Ever wonder how your business compares (security wise) to others in your industry?
This report highlights any deviation from industry standards and provides important information like open wireless networks and internet content accessibility.
6) External Vulnerabilities Report (Full Detail): As one of the most comprehensive, detailed reports offered in this security assessment, the External Vulnerability report lists security holes, warnings and helpful tips that encourage you to make better network security decisions.
You’ll also receive a full NMap Scan which checks all 65,535 ports and shows you which are open. This item in particular is critical for many standard security compliance reports.
This security assessment can be done once or twice a year, to monitor your ever-changing IT requirements and changes in technology.
Interested in running an IT Security Assessment to identify the vulnerabilities within your network? Contact our office for details at (262) 522-8560 or send us a request online.