Quick Test For Network Vulnerabilities
Ever worry whether your IT network is vulnerable to attacks or not? We’ll here are a couple surefire ways to find out.
One alternative is to hire a topflight consulting firm to run penetration tests, launch tiger teams, analyze system logs, and perform social engineering, then produce a report three inches think, plop it on your desk, and hand you a bill for $30,000.
The other alternative is to ask me. And I’ll tell you for free.
You have bad passwords for end users and system administrators; ports and services on key application servers and firewalls are open that shouldn’t be; there are at least a handful of unauthorized wireless access points in the building; confidential information is routinely forwarded outside the company through email and browser connections; many servers and desktops are not patched with the latest security fixes or antivirus updates; end users are oblivious to security policies or violations; and loads of former employees and contractors still have not been de-provisioned from the network.
There. Now you know. Don’t you feel good that you saved all that money.
I suggest you remedy as many of those that you can easily and cheaply. If you get stuck or find that a couple of those problems are especially difficult to fix, ping me, I’ll whip up a recipe of technologies and processes for quick relief.