Business Computer Security Onsite Security Assessment

Mobile Tech Business Services 
Computer Security Assessment


Is your business secure against cyber attacks?  Are you prepared to respond to a cyber-incident?

We perform onsite information systems security analysis of your business and help you implement secure systems designs for your applications, networks and devices.

Are you monitoring your network traffic streams from end to end?
Is your data encrypted?  
Do you have a mobile device management policy?
Do you have a backup recovery plan? 
Do you have a recovery plan in place for a Ransomware attack?

A well documented and tested backup recovery plan is critical to recovering from a cyber attack. 

The Tampa Bay Times has reported that Tampa Bay and Pinellas County businesses are known targets of cyber criminals.  

"71% of Ransomware Attacks Targeted Small Businesses in 2018" 
~ Health IT Security, March 27, 2019 ~

The Tampa Bay Times reported on June 28, 2019 that, "Ransomware is a growing trend with perpetual threats from tiny Belleair Bluffs to larger municipalities like the city of St. Petersburg" 

The TechSpot posted on July 1, 2019 that,"It's starting to look as if Florida cities have become the favorite target for ransomware attacks"
Palm Springs vs. Riviera Beach 
Being Prepared For Ransomware Makes All The Difference 
Defense-in-Depth Layered Security Strategy
Multiple security solutions are combined to implement secure systems designs for your applications, networks and devices.
71% of Ransomware Attacks Targeted Small Businesses in 2018

"About 70 percent of ransomware attacks in 2018 targeted small businesses, with an average ransom demand of $116,000, according to a recent report from Beazley Breach Response Services.

Beazley researchers analyzed 3,300 ransomware attacks against their clients last year and found the highest ransom demand was $8.5 million. The highest demand paid by one of their clients was $935,000."

As a whole, ransomware attacks have increased 11 percent from the past year, with 206.4 million attacks, according to recent SonicWall research. The increase is due to hackers mixing and matching malware components to create new variants, which makes it more difficult for tech to detect and identify these threats.

These attacks have increased 133 percent during the last year. These cyberattacks begin with credential theft by phishing or malware campaigns"

Security Policies

Mandatory vacations
- Job rotation
- Separation of duties
- Clean desk
- Background checks
- Exit interviews
- Role-based awareness training
- Data owner
- Systems administrator
- System owner
- User
- NDA
- Onboarding
- Continuing education
- Acceptable use policy/rules of behavior
- Adverse actions
• General security policies
- Social media networks/applications
- Personal email

Business Impact Analysis

• RTO/RPO
• MTBF
• MTTR
• Mission-essential functions
• Identification of critical systems
• Single point of failure
• Impact
- Life
- Property
- Safety
- Finance
- Reputation
• Privacy impact assessment
• Privacy threshold assessment

Business Risk Management

• Threat assessment
- Environmental
- Manmade
- Internal vs. external
• Risk assessment
- SLE
- ALE
- ARO
- Asset value
- Risk register
- Likelihood of occurrence
- Penetration testing 
- Vulnerability testing
- Risk response techniques
- Accept
- Transfer
- Avoid
- Mitigate
• Change management

Network Review

• Firewall
- Stateful vs. stateless
• VPN concentrator
• NIPS/NIDS
• Router
- ACLs
• Switch
- Port security
• Access point
- SSID
- MAC filtering
• DLP
- USB blocking
- Cloud-based
- Email
• NAC
- Host health checks
• Mail gateway
- Spam filter
- DLP
- Encryption

Penetration Test & Vulnerability Scan

• Protocol analyzer
• Network scanners
- Rogue system detection
- Network mapping
• Wireless scanners/cracker
• Password cracker
• Vulnerability scanner
• Configuration compliance scanner
• Exploitation frameworks

Computer Security Tools

• End point solutions
• Data sanitization tools
• Data encryption tools
• Backup utilities
• Data loss prevention
• Mobile device management
• Anti-Virus / Anti-Malware
• Patch management
• Security Awareness Training
• Security policies and procedures

Are your computer systems secure?

Our computer security review troubleshoots common security issues.

Unencrypted credentials/clear text
• Logs and events anomalies
• Permission issues
• Access violations
• Certificate issues
• Data exfiltration
• Misconfigured devices
- Firewall
- Content filter
- Access points
• Weak security configurations
• Personnel issues
- Policy violation
- Insider threat
- Social engineering
- Social media
- Personal email
• Unauthorized software
• Baseline deviation
• License compliance violation
(availability/integrity)
• Asset management
• Authentication issues
Book Service
Share by: