The 3 Primary Components of a Network Security AssessmentOctober 9, 2020 3:19 pm | Published by Next Horizon
Recently updated on August 8th, 2022
On average, only 5% of a business’ files are protected properly. According to Verizon, organizations of 250 employees or less have the highest targeted malicious email rate. These stats are two of many that allude to the necessity for regular network security audits for businesses. In our blog, 4 Steps When Performing a Network Cybersecurity Audit, we describe how to prepare for the audit, but here we will go into more detail on each of the assessments that are performed on your system.
Security Risk Report
The risk report contains issues detected during our security audit that indicates the general health of your network environment security and protocols. Based on a number of variables, we identify what vulnerabilities your network has with scores for each category. From dark web scans to internal and external vulnerabilities, the risk report will provide you with a snapshot of your security infrastructure.
Our network security risk report includes scores on, but is not limited to the following variables:
- Compromised Passwords Found On The Dark Web
- Critical External Vulnerabilities Detected
- Account Lockout Disabled
- Medium External Vulnerabilities Detected
- Password Complexity Not Enabled
- Password History Not Remembered For At Least Six Passwords
- Inconsistent Password Policy / Exceptions To Password Policy
- Lack Of Web Filtering
- Open Or Insecure Wi-Fi Protocols Available
- Local Security Policy Consistency
- Searched Web Content Analysis
“If you spend more time on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked.”
Richard Clarke, White House Cybersecurity Advisor, 1992-2003
Consolidated Security Report Card
The Computer Security Report Card assesses individual computers at a high level based on various security criteria. The report card should be viewed as a relative measure as to how well a computer complies with security best practices. There may be specific reasons or compensating controls that may make it unnecessary to achieve an “A” in all categories to be considered secure.
View a Computer Security Report Card Sample
“Thinking of cybersecurity solely as an IT issue is like believing that a company’s entire workforce, from the CEO down, is just one big HR issue.”
Steven Chabinsky, Global Chair of Data, Privacy & Cybersecurity at White & Case LLP
External Vulnerability Scan Detail Report
An external vulnerability scan allows us to put on the hat of a hacker. Performed outside of your network, our external scan detects potential vulnerabilities including open ports in your firewall or any other opening that could enable hackers to infiltrate your network.
An Example of an External Vulnerability Report Item
“It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.”
Stéphane Nappo, Global Chief Information Security Officer at Société Générale International Banking
Concerned About Your End-to-End Security?
Next Horizon is a technology company that specializes in cybersecurity for small and mid-size businesses. With many businesses focusing on revenue right now, we don’t want any organization to face a setback due to cybercrime. To that end, we are offering a complimentary IT security assessment that includes a security risk report, consolidated security report card and an external vulnerability scan.
From security architecture to penetration testing and compliance, Next Horizon will ensure computer security while providing data accessibility. We make it our mission to leverage emerging technologies to reduce costs and mitigate threats. A secure IT environment helps businesses meet regulatory compliance and prevent costly exposure.cybersecurity, IT, IT Security, network security, security audit
Categorised in: Cloud Computing, IT Solutions, Networking, News, Security, Security Solutions