IT Vulnerability Overview
Home » Our Services » Security » IT Vulnerability Overview
Protecting corporate information and technology assets from malicious threat agents, internal and external, is a significant challenge for most enterprises. Awareness is a crucial aspect to ensure staff can identify the signs of malicious attacks to your business
The confidentiality, integrity and availability of valuable information is a complex challenge facing all business today. It is critical to view security holistically across the technology stack, as vulnerabilities at each layer of the information environment expose an enterprise to differing threats. Investment in security, and an assessment of the existing posture, must be made based on a complete external and internal overview.
The ITVO service examines four elements of the information technology (IT) landscape that commonly represents an enterprise attack surface. Vulnerabilities discovered in each of the following domains contribute to the majority of modern breaches. CT Group will conduct a modular review of your business systems, and after analysing the data, will produce valuable reporting.
- Internal Risk Summary Report - An executive level overview highlighting critical internal information security risks.
- Full Network Vulnerability Assessment Report - A detailed report communicating all findings from an internal network vulnerability assessment. The Internal Risk Summary Report is the high level analysis of these findings.
- Asset Detail Report - A report identifying the network visible assets as discovered during the network vulnerability assessment.
- Security Risk Report. An executive level overview highlighting the current adherence to or deviance from known defensive administration best-practice.
- Security Policy Assessment. A detailed review of the security policies that are in place on both a domain wide & local machine basis.
- Shared Permissions Report. A comprehensive list of all network “shares” by machine, detailing which users & groups have access to which devices & files, & what level of access is permitted.
- User Permissions Report. A list of permissions by user, showing all shared computers & files to which individual employees have access to.
- External Risk Summary Report. An executive level overview highlighting critical external information security risks.
- Visible External Service Vulnerability Report. A detailed report communicating all findings from an external network vulnerability assessment. The External Risk Summary Report is the high level analysis of these findings.
- Report of access & conditions. An executive level overview highlighting location, security & other hazards relating to the server room location & conditions of the room
- Images included: with permission we will include photographic evidence of the location and highlight the concerns or risks