A process of identifying, quantifying, and prioritizing the vulnerabilities on a system.
A review is conducted of vulnerabilities that could be exploited by external users without credentials or appropriate rights to access a system
A review is conducted of your IT program using compliance regulations and best practices. The audit will focus on management oversight, policies and procedures, staff training, information security, and risk management.
A review is conducted of your employees’ responses in an attempt to manipulate staff into divulging confidential/and or personal information that can be used fraudulently.
A review is conducted of your business continuity management program including best practices and simulated tabletop exercises. The audit will focus on management oversight, policies and procedures, staff training, and simulated tabletop exercises covering selected business interruptions.