network & security assessment - lanworks.com€¦ · lanworks – network & security...

4
Personalized IT for Your Business Network & Security Assessment Sample Documentation Network Assessment & Risk Report Security Assessment & Data Breach Liability Report Security Assessment User & Behavior Analysis

Upload: others

Post on 22-Jun-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Network & Security Assessment - lanworks.com€¦ · Lanworks – Network & Security Assessment 4 Security Assessment – User Behavior Analysis This assessment will analyze user

Personalized IT for Your Business

Network & Security Assessment

Sample Documentation

Network Assessment & Risk Report Security Assessment & Data Breach Liability Report

Security Assessment User & Behavior Analysis

Page 2: Network & Security Assessment - lanworks.com€¦ · Lanworks – Network & Security Assessment 4 Security Assessment – User Behavior Analysis This assessment will analyze user

Lanworks – Network & Security Assessment 2

Network Assessment - Risk Report

Lanworks will evaluate your network and grade your score from 1 -100, where 100 represents significant risk and potential issues. The score is risk associated with the highest risk issue.

This report will contain a summary of issues detected during the Network Assessment

process, and it is based on industry-wide best practices for network health, performance,

and security. The Overall Issue Score grades the level of issues in the environment, and

an Overall Issue score of zero (0) means no issues were detected in the environment. It

may not always be possible to achieve a zero score in all environments due to specific

circumstances.

Network Discovery Tasks associated with this assessment will include:

Sample Report

Page 3: Network & Security Assessment - lanworks.com€¦ · Lanworks – Network & Security Assessment 4 Security Assessment – User Behavior Analysis This assessment will analyze user

Lanworks – Network & Security Assessment 3

Security Assessment – Data Breach Liability Report With data breaches all over the news, small and midsize businesses need to manage their exposure to the financial risk that accompanies cyber threats. Data breaches come in many shapes and sizes. The average person hears "data breach" and probably thinks of hackers. But there are many kinds of cyber incidents, and most don’t come from malware or ransomware. Instead they are the result of insider data breaches, data theft by employees, and employee mistakes. Most business owners understand that personally identifiable customer information they have on their computers is a target for hackers and that their online presence leaves them open to liability. However, far fewer take adequate measures to protect their business.

To mitigate the risk of civil litigation and other penalties when a data loss or theft

occurs, our cyber liability and data breach report is designed to expose just how

vulnerable your organization may be. The report not only identifies specific and

detailed instances of personal identifiable information (PII) throughout your

computer network that could be the target of hackers and malicious insiders but also

calculates and quantifies the potential monetary liability. Additionally, the security of

the computer is also examined to quantify the probability of a breach.

Is your data at Risk?

Sensitive Data Exposure occurs when an application does not

properly protect sensitive information. Application Data

Vulnerabilities and Sensitive Data Details will be outlined. Typically

this will include;

Credit Card Information

Social Insurance Numbers

Passwords

Banking Information

Other sensitive information

Sample Report

Page 4: Network & Security Assessment - lanworks.com€¦ · Lanworks – Network & Security Assessment 4 Security Assessment – User Behavior Analysis This assessment will analyze user

Lanworks – Network & Security Assessment 4

Security Assessment – User Behavior Analysis

This assessment will analyze user behavior and accessibility pertaining to;

Interactive Logon (logon at keyboard and screen of system)

Network (logon for remote access to a system resource, such as a shared folder)

Remote Interactive Logon (Terminal Services, Remote Desktop, or Remote Assistance)

One of the most common risk exposures, is Failed Logon Attempts.

Our assessment will provide details pertaining to;

Forgotten passwords/usernames

Lack of security restrictions

Malicious activities

Improper audit procedures

Sample Report