Agile, Secure & Responsive IT Environments

Security Assessment

Request Your Security Assessment Today

Don’t leave yourself exposed to data loss that leads to litigation, fines, or front-page news. Many business, municipalities and schools across the region have experienced phishing scams, exposure to dark web threats, internal hacks, ransomware blackmail and attacks to steal critical business and personal data. Our complementary assessments enable us to detect risks and determine if mitigation efforts are warranted.
A Comprehensive Security Audit includes the following deliverables:
  • An executive summary
  • Overview of the assessment scope and objectives
  • Assumptions and limitations of the assessment
  • Methods and tools used
  • Design of the current environment or systems with applicable diagrams
  • Security requirements
  • Summary of findings and recommendations
  • Assessment results:
    • General control review
    • Vulnerability test
    • Risk assessment, including identified assets, threats, vulnerabilities, impact and likelihood assessment, and the risk results analysis
  • Recommended actions
© 2020 Flagship Networks, Inc. All rights reserved.