Top

Why is Information Security Assessments important?


These assessments help protect your assets, prevent unnecessary downtime, and give you peace of mind.

We’ll meet with your team and provide an assessment of the current health of your computer network and business technology.

We’ll help you understand and prioritize the remediation of these vulnerabilities to secure your systems and protect your business.

Services We Offer

Every business relies on technology at some level, and network-integrated technology carries with it specific risks of which most people aren't fully aware. When you look in the right places, you’ll find that every computer network has significant security risks which have gone undetected. That’s why every business should perform an Information Security Assessment at least annually. These assessments help protect your assets, prevent unnecessary downtime, and give you peace of mind.

As a leading provider of IT services, we’ll meet with your team and provide an assessment of the current health of your computer network and business technology. We’ll analyze your network to identify hidden vulnerabilities currently exposing your organization to risk. We’ll help you understand and prioritize the remediation of these vulnerabilities to secure your systems and protect your business.

Here are some examples of what we assess:

  • Hardware:
    • Servers, Workstations, Printers, and non-AD devices (like switches/routers/printers)
    • Old computers which haven’t been properly removed from the network
  • Software:
    • Systems missing critical Patches/Service Packs/Security Updates
    • Accounts with weak/insecure passwords
    • Systems with missing or outdated Anti-Virus/Anti-Spyware software
  • Configuration:
    • Inconsistent security policies across the network
    • Outbound communication channels that should be blocked
    • Inadequate Web Content filtering (Social Media, Entertainment, Pornography, Illegal Downloads, Malicious sites, etc.)
  • Access Control:
    • Misconfigured user access to Network Shares
    • Detailed breakdown of Security Group membership and access
  • Security Risks:
    • Old user accounts which haven’t been properly deactivated
    • Open network ports posing security risk

Tangible Results

We provide you with an Executive Summary Report which includes an overview of the devices on the network and a network Risk Score and analysis of each issue identified. We’ll review this document with you to discuss the findings in detail and answer any questions you may have.

In addition to the Executive Summary Report, we’ll provide supplementary detailed reports which you and your IT service provider can use to gain a thorough understanding of the current configuration of your IT systems and the risks identified.

  • SECURITY RISK REPORT. This executive-level report includes a proprietary Security Risk Score along with summary charts, graphs and an explanation of the risks found in the security scans.
  • SECURITY POLICY ASSESSMENT REPORT. A detailed review of the security policies that are in place on both a domain-wide and local machine basis.
  • SHARE PERMISSION REPORT BY COMPUTER. Comprehensive lists of all network “shares” by computer, detailing which users and groups have access to which devices and files, and what level of access they have.
  • SHARE PERMISSION REPORT BY USER. Organizes permissions by user, showing all shared computers and files to which they have access.
  • OUTBOUND SECURITY REPORT. Highlights deviation from industry standards compared to outbound port and protocol accessibility, lists available wireless networks as part of a wireless security survey, and provides information on Internet content accessibility.
  • EXTERNAL VULNERABILITIES FULL DETAIL REPORT. A comprehensive output including security holes, warnings, and informational items that can help you make better network security decisions, plus a full NMap Scan which checks all 65,535 ports and reports which are open. This is an essential item for many standard security compliance reports.
  • ANOMALOUS USER LOGIN ACTIVITY. Methodically analyze login history from the security event logs. The report uses mathematical modeling and proprietary pattern recognition to highlight potential unauthorized users who log into machines they normally do not access and at times they normally do not log in. This report delivers a security professional focus and pinpoints a manageable set of logins to investigate. The alternative is a time-consuming, manual spot check that often misses the mark and is far less reliable.

During our assessment, we’ll also discuss ways to prevent unauthorized access, augment security systems, protect sensitive data, and get more out of your technology investment.

Service In 60, Guaranteed


Garner IT knows how detrimental to your business it can be to have computer and server problems preventing you from being productive. We also understand waiting on technicians while you can’t fill orders and customers are complaining just compounds the problem. We value your time! When you have a technical problem and call our support team we guarantee to have one of our experienced technician responding to your problem within 60 minutes or less.

Newsletter


Subscribe to our newsletter to receive latest news and updates.


By submitting this form, you are consenting to receive marketing emails from: Garner IT Consulting, 1330 Harrison Ave. , Panama City, FL, 32401, http://www.garner-it.com. You can revoke your consent to receive emails at any time by using the SafeUnsubscribe® link, found at the bottom of every email. Emails are serviced by Constant Contact