Vulnerability Assessments

Are You Vulnerable to a Cyber Attack?

Let us answer that...





A vulnerability assessment is the identification and categorization of security weaknesses found within a system. Vulnerabilities can stem from a variety of issues; anything from an unpatched application or operating system to a small misconfiguration in a firewall or router can put your system at risk.  Vulnerabilities can also be the result of unknowingly permitting too much access to a system or even a portion of a network.  


If vulnerabilities are exploited, the impact can be tremendously large and damaging.  Fortunately, most vulnerabilities can be easily resolved.  Frequently when an organization falls victim to a cyber-attack, the vulnerability could have been easily mitigated.  Attackers are readily aware of vulnerabilities and are always on the lookout for an easy target.  


It can be difficult to defend against an attack if an organization is unaware of vulnerabilities already present in their system. This becomes increasingly difficult when one considers that new vulnerabilities are discovered in applications and operating systems every day.  Additionally, anytime the system is altered, the potential exists that a vulnerability could be created.  An aggressive patching policy in conjunction with regular vulnerability assessments can drastically reduce the risk that your system, network, or application will fall victim to an attack.


Because of the dangers vulnerabilities pose, frequent vulnerability assessments are a requirement for most compliance standards (NIST, HIPPA, PCI, SoX, etc.).






External Network Vulnerability Assessment

An external network vulnerability assessment can identify how a potential attacker can cause a threat to your system from the outside of your network.  Our team can assess the safety of the entirety of your outward presence, including your perimeter devices, servers, applications, and encryption technology.  Anything that is accessible from the internet, we will assess for potential vulnerabilities. Our assessment includes both a documentation of findings and recommendations on how to mitigate these vulnerabilities effectively and efficiently.  Our engineers will stop at identifying the vulnerability and thereby making this a safe and lower-cost option for production environments.


Internal Network Vulnerability Assessment

An internal network vulnerability assessment is more comprehensive than an external assessment in that the entirety of the organization’s network is assessed, not just the perimeter.  While strong external security is paramount, savvy attackers have found ways to circumvent the firewall and other border protection devices.  They often do so through client-side attacks, such as enticing users to click a link, open an infected document, and/or leading them to the attacker’s malicious website. Organizations must develop strong layers of internal security to prevent these attacks.


With an internal network vulnerability assessment, our engineers will assess your entire network infrastructure and each layer of security for vulnerabilities.  Typically, this assessment will include examining everything, from servers, desktops, and group policy, to the configuration of networking devices and firewalls.  Our assessment includes both a documentation of findings and recommendations on how to mitigate these vulnerabilities effectively and efficiently.