We are offering a network assessment for your business.
We all know that it is not feasible to make a network completely secure, however there are many basic things that we can easily check to get an idea of the health of a network.
This is why we have tools that make auditing network security a snap, but in case you are not already using our assessment software, we have created this checklist for you!
Use this list of misconfigurations and vulnerabilities to understand how important it is to conduct a network and security assessment.
We all know that it is not feasible to make a network completely secure, however there are many basic things that we can easily check to get an idea of the health of a network.
This is why we have tools that make auditing network security a snap, but in case you are not already using our assessment software, we have created this checklist for you!
Use this list of misconfigurations and vulnerabilities to understand how important it is to conduct a network and security assessment.
Security Assessments is a game changer for your business!
With the Security Assessment Module, We can:
Missing critical patches
❏ Missing or out-of-date antivirus and anti-spyware ❏ Computers with open listening ports ❏ Unsupported operating systems in use ❏ Enabled login accounts for ex-employees/vendors ❏ Weak/Insufficient Password requirements ❏ Systems with weak local passwords ❏ Non- Administrators with Admin or Domain Admin privileges ❏ Improper network share permissions allowing unauthorized users access to sensitive information ❏ Credit Card/PII stored on unauthorized systems ❏ Firewall has open ports with known exploitable issues ❏ Rogue or unauthorized devices and computers Learn |
❏ Lack of outbound (egress) filtering by
the Firewall ❏ Lack of content filtering ❏ Systems inside the network with exploitable ports/ protocols ❏ Application vulnerabilities ❏ Auto screen lock disabled ❏ Account lock out disabled ❏ Incorrect and inconsistent application of security settings ❏ Assure domain policies and local security policies match best practices ❏ Large number of failed logins ❏ Anomalous user logins ❏ Untested or missing backup / business continuity ❏ Improper physical security for server room ❏ Physical Threats in Server room (temperature, sprinkler head location, etc.) |
![]()
|
![]()
|
![]()
|
![]()
|
![]()
|
![]()
|
![]()
|
![]()
|
![]()
|
![]()
|

security_assessment_login_history_by_computer_report-compubc.pdf | |
File Size: | 2362 kb |
File Type: |