Security Assessments for your home and business

COMMERCIAL CYBER SECURITY ASSESSMENT

A cyber security assessment involves evaluating an organization's digital infrastructure, identifying vulnerabilities, and assessing risks to prevent potential cyber threats. Through comprehensive analysis and testing, it aims to enhance security measures, protect sensitive data, and ensure resilience against evolving cyber risks, ultimately safeguarding business operations and reputation.

Trusted Internet's Cyber Threat Assessment Program (CTAP) provides in-depth information about your network's current state of Risk, covering key security threats, productivity, performance areas and compliance.

  • FRAMEWORK-BASED GAP ASSESSMENTS: CMMC, NIST 800-171, ISO, HIPAA, PCI.

  • PASSIVE CYBER THREAT ASSESSMENT: We begin by deploying a passive sensor on your network's mirror (span) port without interrupting your existing infrastructure. We’ll leave it there for up to 14 days and listen.

  • ACTIVE PENETRATION TESTING: We assess your internal network infrastructure and endpoints for threats.

RESIDENTIAL CYBER SECURITY ASSESSMENT

We get calls daily from people telling us their phones, computers, or homes have been compromised. Where an incident response is needed, we respond. Where homeowners worry that their homes are compromised, our first step is almost always a cyber security assessment of the home. It goes like this.

Priority #1: Assess the cyber security landscape of your home.  

A Virtual CISO™ and a Cyber Security Engineer will visit your home. Your new Virtual CISO™ will sit with you and your family for approximately two hours, educating the family on cyber risks and best practices. At the same time, the Cyber Security Engineer will install a commercial-grade firewall, anti-virus and anti-ransomware on your home network, computers and mobiles. When we leave, your home will be secured. We’ll monitor it for the next two weeks.

Based on findings, we’ll have a report ready with recommendations approximately three weeks after our visit.

  • The Current architecture of your home network

  • Network health and observable security measures 

  • Current security appliances 

  • Wi-Fi network encryption and segmentation

  • VPN usage and travel cyber practices

  • Cyber protection of your physical security systems

  • Ransomware risks 

  • Current endpoint anti-malware solution. If you believe your phones or computers have been compromised, we’ll test for that. 

  • Outdated and/or potentially vulnerable hardware 

  • Unprotected servers

  • Unattended remote access software

  • Mobile Phone Applications

  • Dark Web and Social Media searches for negative sentiment

For more information, contact your Virtual CISO™ or email us at staysafeonline@trustedinternet.io.