Phase 1: Configure Systems & Begin Security Scan
The first step is to set up the security scanning software and a few other tools so we can evaluate your network security.
These scans will begin:
- External Vulnerability Scan
- Network and Security Data Collectors
- Internal Vulnerability Scan
These tools take time, so they'll run for a few days to a few weeks, depending on the size and complexity of your network.
Phase 2: Physical Security Walk-through and Interviews
One of the most often overlooked sections of cyber security is physical security. We'll make sure that your IT systems and data are protected on a physical level, as well as at the cyber level.
We'll also sit down with your executives and your IT team (if applicable) to understand some of your processes related to data collection, storage, security threat mitigation, etc.
Phase 3: Final Data Collection & Report Preparation
We'll collect all data and assemble it in a meaningful way - that way it's clear to the executives and stakeholders where the holes are and what needs to be done moving forward.
Phase 4: Delivery and Review With Stakeholders
You'll get a high-level executive summary, as well as detailed reports with all of our findings.
We'll review the highlights together and explain the situation. You'll get actionable recommendations and insights you can use whether you work with us in the future or not.
By the end of this meeting, you'll know exactly where your network is strong and where it could use improvement.
How Much Does an Assessment Cost?