Infrastructure assessment
Most often than not, the security breaches happen because of a “weak link” in the company internal perimeter. This could be an outdated equipment such as a router or printer, or a less-used computer that is there to offer a very basic functionality and is not properly maintained. These devices are the points where security breaches happen or get amplified and this assessment is focused towards it
Solution
- Collaboration with the IT division for completeness
- Network asset inventory with scan tools or from internal documents.
- Hardware and software inventory security audit
- Security audit of sample devices such as laptops or routers. Security software monitoring
- AD policy audit
External assessment
Risk
The external-facing devices and applications are the entry point for an attacker to start exploiting the company assets, and thus they need to be properly secured. They have been in the past the focal point of security audits and are very much required in case the company needs any security certification. A breach could happen very fast, such as in the case of a missed critical update on a security component that has recently been publicly disclosed as vulnerable.
Solution
- The company’s external internet presence will be evaluated.
- All assets will be scanned with automated and manual tools
- Website pentest + any other external web applications
- External network pentest
Anti-Ransomware package
Risk
The recent rise in ransomware attacks does look like it is going to stop anytime soon. The key issue is the discovered profitability for attackers because companies prefer to pay the ransom to have their data back. There is an arms-race between hackers trying ever more sophisticated methods of planting ransomware and the large arsenal of security tools and protections that should defend against it.
Solution
- This audit will verify every possible scenario of a ransomware attack and will ensure that there all layers of protection are fully and properly implemented
- Includes infrastructure assessment
- A special virtual machine will be deployed within the company network to catch any circulating ransomware
- Phishing exercises will be conducted
- Backup policy audit and backup pollution test will be performed
- A training for employees to ensure they know how to defend themselves
- Systems will be graded by their ransomware defence layers. These include hardware equipment such as routers and network design
Data-leakage and forensics package
Risk
A special growing concern among businesses is the theft of their intellectual property. There are numerous cases where customer data, private source code or other sensitive information has leaked to competitors or publicly. Most times these breaches are never disclosed and rarely get to court because of difficulty or lack of proof.This solution is designed to evaluate and mitigate risk of information leakage of sensitive company data
Solution
- An evaluation of sensitive assets will be conducted along with the list of access controls
- Several simulations will be conducted to ensure that even when data has leaked, the event can be traced down to responsible person
- Systems will be evaluated with regards to their support for forensics
- An insider attack will be simulated
All packages are accompanied by a monthly security check and update
- This will ensure that company maintains a good security posture permanently
- A regular internal and external scan will be conducted
- A partnership with another security responsible person will be established. There will be monthly meetings and alignements.
- Sensors will be deployed for internal monitoring for security events
- Email notification in case of security news that directly affect company infrastructure along with recommended actions
- Security consultancy and assistance for configuring equipment or purchasing software
- Level 1 includes 10 hours of dedicated time with a security expert. This includes a internal monthly scan
- Level 2 includes 20 hours of dedicated time with a security consultant. This includes actively monitoring of key critical infrastructure assets