Home
Services
Career
Job Postings
About
Innovation Management

Headquarter

445 Dexter Avenue Suite 4050 Montgomery, AL 36104

Winter 2009 Network Armor

NO ONE WANTS TO GET THE 2AM CALL

winter2009You know the one. It goes something like:
…we’ve been hacked ….records leaked …personal information exposed …how could this have happened …may prove financially devastating to the organization… Taking a few simple steps could not only help ensure both your network and your budget are secure – it could also keep you from getting the 2am call.

IT SECURITY FUNDAMENTALS: TECHNICAL SECURITY ASSESSMENTS

Did you know for little to no investment you could quickly reduce the possibility of a security breach? These steps can help you get started:

Step 1: Know what types of services are available.
In order to choose the best security service for your needs, you should understand the types of assessments that are available. Listed below are three common assessments and a brief description of each. An ICS consultant can help you determine which is most appropriate for your organization.

Step 2: Consider your testing options.
When considering a Vulnerability Assessment, Penetration Test or Web Application Assessment, you will also need to determine whether to conduct internal testing, external testing, or a combination of both.

Step 3: Determine testing type and frequency.
Think about what an acceptable level of risk may be, and what areas you want to ensure are safeguarded. ICS recommends performing vulnerability assessments quarterly, penetration tests bi-annually, and web application assessments at least annually or as new applications are added.

Interested in learning more? Click here to download the full whitepaper.

 

VULNERABILITY ASSESSMENT

va_0510A vulnerability assessment is an unobtrusive way to identify risks present within your system. These risks may stem from unpatched or obsolete software, poorly configured systems, and/or inadequate security protocols. ICS will identify areas that are potentially exploitable by authorized users or attackers, and guide you through the steps needed to secure those weak areas.

 

Recommended frequency: Quarterly | Learn more

 

PENETRATION TESTING

pt_0510A penetration test (or pen test) takes the vulnerability assessment one step further, and is an invaluable component of a comprehensive technical security assessment. During a penetration test, an ICS certified ethical hacker will perform an actual attack on the points of weakness identified in the vulnerability assessment. If the attack is successful, ICS will then assess the impact an actual breach could have on your organization. The pen test will give you a clear understanding of how the weaknesses identified in the vulnerability assessment can undermine your business.

Recommended frequency: Bi-annually | Learn more

WEB APPLICATION ASSESSMENT

wa_0510Virtually all businesses today employ web-based applications for sales, marketing, accounting, and other standard business functions. While these applications have many benefits, including online accessibility and enhanced team collaboration, they may also expose your sensitive data to unauthorized access. A Web Application Assessment will uncover vulnerabilities that exist in web-based applications and provide strategies to maximize your system security.

Recommended frequency: At least annually, or as new applications are added | Learn more

Unicorns And Cloud Solutions

It all started out so easily. Instead of—or in addition to—networking servers and other proprietary hardware, the notion arose that we should migrate data to

Read More »