Documentation interview which covers infrastructure, policy, procedures, and security mechanisms. The questionnaire is intended to identify areas of risk outside of what tools detect. Areas of interest such as physical security, public data, wired network security, and wireless network security include some validation.
Test workstation(s) and server(s) to collect information about their current configuration. We perform a comparison of your results and score them against The Center for Internet Security’s (CIS) Security Configuration Benchmarks. Security Configuration Benchmarks are recommended controls for the hardening of operating systems and software applications.
Internal and external scans of environment performed to identify common vulnerabilities in hardware or services. Application Specialist Kompany, Enhanced Security Services will only perform vulnerability scans as part of a Risk Assessment.
A report detailing the collective results of the Cybersecurity Risk Questionnaire, Baseline Configurations, Vulnerability Scans, evaluation of data, risk probability analysis.
A controlled test of your end-users response to an inert phishing email. Learn more about phishing campaigns.