Cyber Security Consultation services
Our IT security consultants act as a third party independent adviser to upper management / business owners.
Our IT security audit process includes:
- Identifying current security software / hardware practices.
- Probing the network for open network shares.
- Probing the network for PC’s with blank passwords and default “administrator” accounts with easy to guess passwords.
- DMZ identification and testing for security vulnerabilities.
- VLAN identification and testing for security vulnerabilities.
- Audit user accounts and security groups.
- Audit network shares and who has access to what.
- Audit VPN users.
- Audit the Firewall for open ports and review effectiveness.