Who Has Access to Your Network? (What You Find Might Surprise You)

On June 3rd, 2015, posted in: Security Threats by Comments Off on Who Has Access to Your Network? (What You Find Might Surprise You)

There are many ways a network can be compromised and unfortunately, few businesses realize what is actually going on “behind the scenes”. You might take the time to visit the doctor for your annual check-up, but when was the last time your business had a security check-up?

Think about it. Your network is constantly at risk.

  • How many emails are exchanged on a day-to-day basis within the company?
  • How many web pages are visited each day with outdated internet browsers?
  • How do you really know if employees are keeping their PC security software up to date?
  • How do you know if Windows updates being run?

While you might have firewalls, virus protection tools and internet filters in place, they aren’t 100% foolproof. If they were, we wouldn’t see the hugely publicized security breaches we see the news headlines today. When these tools address a security threat, a new one emerges.

Between email-based viruses sneaking in through unprotected mailboxes, to worms, viruses and malware, if you haven’t taken the steps to fully secure your system, you might be surprised what vulnerabilities you’ll find within your network.

You can’t monitor the security habits within the company, but you can run a check-up to find out just how “healthy” your business is security wise.

Identify Security Vulnerabilities with our Comprehensive IT Security Assessment

Ontech Systems now offers a complete IT Security Assessment that scans your network and gives you an in-depth look at network areas that are typically the most unsecure. We will provide you with 6 comprehensive reports that deliver all the information you need to know, right at your fingertips.

Assess Your Security Risk Score1) Executive-Level Security Risk Report: Business owners, executives and managers want to see high-level detail with summary charts, graphs, scores and an overview of any risks found.

This executive-level report provides just that.

2) Security Policy Assessment Report: Our Security Policy report provides you with a detailed review of the domain-wide and PC based security policies in place within the company.

3) Shared Access Report: It’s good practice to manage file restrictions at an employee level. This report offers a comprehensive list of all network “shares” by computer, showing you, which users or groups have access to which files and devices – and what level of access they have.

4) User Permission Report: This report organizes permissions by user, showing all shared computers and files each user has access to.

Identify vulnerable wireless access points5) Internal Vulnerabilities Report: Ever wonder how your business compares (security wise) to others in your industry?

This report highlights any deviation from industry standards and provides important information like open wireless networks and internet content accessibility.

6) External Vulnerabilities Report (Full Detail): As one of the most comprehensive, detailed reports offered in this security assessment, the External Vulnerability report lists security holes, warnings and helpful tips that encourage you to make better network security decisions.

You’ll also receive a full NMap Scan which checks all 65,535 ports and shows you which are open. This item in particular is critical for many standard security compliance reports.

This security assessment can be done once or twice a year, to monitor your ever-changing IT requirements and changes in technology.

Interested in running an IT Security Assessment to identify the vulnerabilities within your network? Contact our office for details at (262) 522-8560 or send us a request online.

Read previous post:
What Does Downtime Really Cost Your Business?

Did you know the average business experiences 14 hours of downtime each year? CA Technologies conducted a survey that revealed...