Print Friendly and PDF

 

Why does my company need a vulnerability assessment?

vulnerability assessment

The first thing you need to know is what a vulnerability assessment does. A vulnerability assessment provides a business with information on the security weaknesses of their entire network both internally and externally. A “scan” is performed across your companies entire network and a comprehensive report is generated detailing all security risks and prioritizing them starting with the greatest threats. This process offers your organization a better understanding of your assets, security flaws, and overall risk, reducing the chance that a “hacker” will breach your IT systems and catch your company off guard. Once a complete assessment report is generated a plan to rectify the security flaws found can be established.

Connecting Point Computer Center offers 3 different solutions depending on your business's need.

Single Scan: (one time scan/no rectification)

  • Full IP/Port scan with reporting (internal and external)
  • Full Check for vulnerabilities including but not limited to: Meltdown/Spectre (all variants), Intel AMT, Shadow Brokers release (30+ vulnerabilities), web vulnerabilities (if applicable), WannaCry ransomware, ShellShock (if applicable), Drown, and Badlock.
  • A complete inventory of scanned assets.
  • Consultation with a security engineer to discuss findings and recommendations for rectification.
  • Vulnerability report in PDF Format.

vulnerabilty scan quarterly

Bi-Annual Scan: (two scans/no rectification)                                             

  • Full IP/Port scan with reporting (internal and external)
  • Full Check for vulnerabilities including but not limited to: Meltdown/Spectre (all variants), Intel AMT, Shadow Brokers release (30+ vulnerabilities), web vulnerabilities (if applicable), WannaCry ransomware, ShellShock (if applicable), Drown, and Badlock.
  • A complete inventory of scanned assets.
  • Consultation with a security engineer to discuss findings and recommendations for rectification.
  • Vulnerability report in PDF Format.

Quarterly Scan: (four scans/ *full rectification)               

  • Full IP/Port scan with reporting (internal and external)
  • Full Check for vulnerabilities including but not limited to: Meltdown/Spectre (all variants), Intel AMT, Shadow Brokers release (30+ vulnerabilities), web vulnerabilities (if applicable), WannaCry ransomware, ShellShock (if applicable), Drown, and Badlock.
  • A complete inventory of scanned assets.
  • Consultation with a security engineer to discuss findings and possible rectification of findings.
  • Full rectification of applicable findings plus recommendations of further steps/methods to secure all assets. (any hardware and the labor to install the hardware are NOT included in rectification)
  • Complete network map with all assets labeled in PDF format. (both with ZenMap and NMT)

* Additional charges for rectification may apply for businesses with more than 100 nodes