On average, only 5% of a business’ files are protected properly. According to Verizon, organizations of 250 employees or less have the highest targeted malicious email rate. These stats are two of many that allude to the necessity for regular network security audits for businesses. In our blog, 4 Steps When Performing a Network Cybersecurity Audit, we describe how to prepare for the audit, but here we will go into more detail on each of the assessments that are performed on your system.

Security Risk Report

horizontal cone scale that shows the increase of cybersecurity threat from green on the left all the way top red on the right increasing in risk from left to right

 

 

 

 

 

The risk report contains issues detected during our security audit that indicates the general health of your network environment security and protocols. Based on a number of variables, we identify what vulnerabilities your network has with scores for each category. From dark web scans to internal and external vulnerabilities, the risk report will provide you with a snapshot of your security infrastructure. 

Our network security risk report includes scores on, but is not limited to the following variables:

  • Compromised Passwords Found On The Dark Web
  • Critical External Vulnerabilities Detected
  • Account Lockout Disabled
  • Medium External Vulnerabilities Detected
  • Password Complexity Not Enabled
  • Password History Not Remembered For At Least Six Passwords
  • Inconsistent Password Policy / Exceptions To Password Policy
  • Lack Of Web Filtering
  • Open Or Insecure Wi-Fi Protocols Available
  • Local Security Policy Consistency
  • Searched Web Content Analysis

“If you spend more time on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked.”

Richard Clarke, White House Cybersecurity Advisor, 1992-2003

Consolidated Security Report Card

The Computer Security Report Card assesses individual computers at a high level based on various security criteria.  The report card should be viewed as a relative measure as to how well a computer complies with security best practices.  There may be specific reasons or compensating controls that may make it unnecessary to achieve an “A” in all categories to be considered secure.  

View a Computer Security Report Card Sample

a colored grid that shows computer IP address with letter grades for various secuirty threats and variables
 

“Thinking of cybersecurity solely as an IT issue is like believing that a company’s entire workforce, from the CEO down, is just one big HR issue.”

Steven Chabinsky, Global Chair of Data, Privacy & Cybersecurity at White & Case LLP

External Vulnerability Scan Detail Report

An external vulnerability scan allows us to put on the hat of a hacker. Performed outside of your network, our external scan detects potential vulnerabilities including open ports in your firewall or any other opening that could enable hackers to infiltrate your network.

An Example of an External Vulnerability Report Item

written description of an external threat with problems and solutions

 

“It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.”

 Stéphane Nappo, Global Chief Information Security Officer at Société Générale International Banking

Concerned About Your End-to-End Security?

Next Horizon is a technology company that specializes in cybersecurity for small and mid-size businesses. With many businesses focusing on revenue right now, we don’t want any organization to face a setback due to cybercrime. To that end, we are offering a complimentary IT security assessment that includes a security risk report, consolidated security report card and an external vulnerability scan.

Sign Up for a Free Security Audit!

Next Horizon provides holistic technology solutions for businesses looking to improve sales, increase agility and optimize productivity. From deploying dedicated development teams to building bespoke business applications, Next Horizon uses its 40+ years of experience and award-winning talent to provide technical business solutions for its clients.

 

Tags: , , , ,

Categorised in: , , , , ,